This C program defines functions to add numbers to a queue and display the numbers in reverse order. The add() function takes user input of up to 5 numbers and stores them in an array. The display() function prints the numbers from the end of the array to the beginning to reverse the order, with front and rear pointers used to track the start and end of the queue. The main() function calls add() to populate the queue, then calls display() to print the numbers in reversed order.
This C program accepts a singly linked list of integers as input, sorts the elements in ascending order, then accepts an integer to insert into the sorted list at the appropriate position. It includes functions to create and display the linked list, sort the elements, and insert a new element while maintaining the sorted order.
The program implements a deque (double-ended queue) using pointers in C language. It defines a node structure with data and link fields. Functions are written to add elements to both front and rear of the deque, delete from front and rear, and display the deque. The main function tests the implementation by performing sample operations on the deque and displaying the results.
This program multiplies two sparse matrices in C. It takes in two matrices from the user and converts them to sparse form by removing all zero values and storing the row, column, and value of non-zero elements. It then performs the multiplication by iterating through each non-zero element in the first matrix and matching columns with row elements in the second matrix, summing the products of the values at matched indices into the result matrix. Finally, it prints out the sparse and result matrices.
This C program creates a linked list of student records with name and roll number. It includes functions to create the list by adding elements, display the list, and delete an element from the list by roll number. Pointers are used to link the elements of the list and dynamically allocate memory for new elements. The main function provides a menu to call these functions and manage the list.
This C program accepts two singly linked lists as input and prints a list containing only the elements common to both lists. It contains functions to create and display the lists, as well as a common_elements function that iterates through both lists, comparing elements and printing any matches. The main function calls list_create twice to populate the lists, display_list to output the lists, and common_elements to find and print the common elements.
The C program takes a string as input from the user, stores each character in a stack data structure, and then pops the characters off the stack to display the reversed string. It uses functions to push each character onto the stack, and then calls a display function that pops the characters off the stack and prints them, outputting the reversed input string.
The document describes a C program that takes a paragraph of text as input and outputs a list of words and the number of occurrences of each word. The program creates a structure with fields to store each word and its occurrence count. It accepts input character by character, separates words by spaces, counts occurrences by comparing to existing words, and outputs the final word-count list.
The program accepts the order and elements of two matrices as input from the user. It then multiplies the matrices and stores the product in a third matrix. The product matrix is then printed to the screen. The program checks that the matrices can be multiplied by verifying that the number of columns of the first matrix matches the number of rows of the second.
This C program accepts student enrollment numbers, names, and aggregate marks. It ranks the students based on their marks, with the highest marks earning rank 1. The program then prints the enrollment number, name, mark, and rank of each student in ascending order of rank.
This C program accepts two strings as input and checks if the second string is a substring of the first string. If it is a substring, the program outputs the starting and ending locations of each occurrence of the substring in the main string. If the substring is not found, the program outputs "Not substring". It uses a while loop to iterate through the strings and compare characters to find substring matches and their positions.
The document contains code for three C programs:
1) A program to generate the first n terms of the Fibonacci sequence, where the sequence is defined as starting with 0, 1, and each subsequent term is the sum of the previous two terms.
2) A program that takes user input for a number n and prints all prime numbers between 1 and n by checking if each number is divisible by numbers between 1 and itself.
3) A program that takes a positive integer as input, calculates the sum of its individual digits by repeatedly taking the remainder and quotient of the number divided by 10, and prints the final sum.
The C program takes a binary number as input, finds its 2's complement by scanning from right to left and complementing all bits after the first 1, and prints the 2's complement as output. It first checks that the input is a valid binary number, then calls a complement() function that reverses the string, complements each bit, and handles carrying for adjacent bits.
This C program uses functions to perform operations on complex numbers represented as a structure with real and imaginary parts. It takes user input for two complex numbers, performs either addition or multiplication based on the user's selection, and displays the result. The main menu allows the user to choose addition or multiplication and calls the arithmetic function accordingly, which contains the code to perform the operation and display the output.
Ex.1 Write a program to print the following pattern
1
2 2
3 3 3
4 4 4 4
5 5 5 5 5
Ex.2 Write a program to find bigger of three integers.
Ex.3 Write a program to calculate GCD between two numbers.
Ex.4 Write a program to find transpose of matrix.
Ex.5 Write a program which deletes an element from an array & display all other elements.
Ex.6 Write a program to calculate XA+YB where A & B are matrix & X=2, Y=3.
Ex.7 Write a program to calculate the total amount of money in the piggy bank, given that coins of Rs.10, Rs.5, Rs.2, RS.1.
& many more.....
This C program allows a user to answer multiple choice questions (MCQs) and checks their answers. It prints out 5 questions, each with 3 possible answers, and prompts the user to enter the number of the correct answer. It then checks each submitted answer and prints whether it is true or false. This allows the program to automatically grade a short quiz consisting of basic MCQs.
This C program adds two numbers by first prompting the user to enter two integers, storing the input in variables a and b. It then calculates the sum of a and b, storing it in the variable c, and prints out the message "Sum of entered numbers" followed by the value of c.
This C program adds two numbers by first prompting the user to enter two integers, storing the input in variables a and b. It then calculates the sum of a and b, storing it in the variable c, and prints out the message "Sum of entered numbers" followed by the value of c.
This document contains C code examples that demonstrate both recursive and non-recursive solutions to common problems:
1) Towers of Hanoi problem using recursive and non-recursive functions.
2) Finding the greatest common divisor (GCD) of two integers using recursive and non-recursive functions.
3) Calculating the factorial of a given integer using recursive and non-recursive functions.
One dimensional operation of Array in C- language 9096308941
This C program allows the user to perform various operations on arrays, including insertion, deletion, sorting, searching, and displaying elements. The user is prompted to enter the number of values to store in an integer array. A menu is then displayed listing the available array operations. Based on the user's selection, the appropriate operation is performed, such as inserting a new element at a specified position, deleting an element, sorting the array, searching for a given value, or displaying all elements. This continues in a loop until the user chooses to exit the program.
This C program takes a user-input integer, adds the digits of that number together by taking the number modulo 10 at each iteration and dividing the number by 10, and prints out the sum of the digits. It prompts the user to enter an integer, uses a while loop to repeatedly take the remainder when dividing the number by 10 to extract each digit and add it to the running sum, and finally prints out the original number and total sum of its digits.
Insertion Sort is a simple data Sorting algorithm which sorts the array elements by shifting elements one by one and inserting each element into its proper position.
http://www.tutorial4us.com/data-structure/c-insertion-sort
This document contains code for two C programs. The first program asks the user to input two integer values, adds them together, and prints the sum. The second program asks the user to input a float value for the radius, calculates the area of a circle using that radius and PI, and prints the calculated area.
Pratik Bakane C++ programs...............This are programs desingedby sy diploma student from Governement Polytecnic Thane.....programsare very easy alongwith coding andscreen shot of the output
This document contains 3 examples of C programming code that demonstrate working with arrays: 1) Printing the reverse of user-input numbers in an array, 2) Separating even and odd numbers from an array into two new arrays, and 3) Merging and sorting two arrays of user-input numbers in descending order into a third array. Each example provides the full code, input/output examples, and brief descriptions to demonstrate array manipulation techniques in C.
1) The document contains 5 programming exercises involving recursive functions, factorials, loops, and switch/case statements.
2) For each exercise, the student is asked to compile and run the provided code, explain how it works, and make modifications as instructed.
3) Modifications include changing hardcoded values to user input, altering loop structures, and replacing switch/case with if/else statements.
The document describes the implementation of a math typesetting module in the Satyrographos programming language. It defines types like math and math-element to represent mathematical expressions. Functions like output and output-element are used to convert a math expression to a string by mapping over its elements. Special characters are wrapped in calls to make-char-info to handle properties like color. Let-math is used to define relational operators like ≤ by combining character, class, and color information.
This document discusses IoT data processing topologies and considerations. It begins by explaining the types of structured and unstructured data in IoT. It then discusses the importance of processing based on urgency and describes on-site, remote, and collaborative processing topologies. The document also covers IoT device design factors and processing offloading considerations including location, decision making, and other criteria.
This document discusses IoT sensing and actuation. It defines transduction as the process of energy conversion from one form to another. Sensors convert various forms of energy into electrical signals, while actuators convert electrical signals into various forms of energy, typically mechanical energy. The document describes different types of sensors and their characteristics like resolution, accuracy, and precision. It also discusses sensor errors and deviations. Finally, it categorizes sensing into four types - scalar sensing, multimedia sensing, hybrid sensing, and virtual sensing - based on the nature of the environment being sensed.
The document describes a C program that takes a paragraph of text as input and outputs a list of words and the number of occurrences of each word. The program creates a structure with fields to store each word and its occurrence count. It accepts input character by character, separates words by spaces, counts occurrences by comparing to existing words, and outputs the final word-count list.
The program accepts the order and elements of two matrices as input from the user. It then multiplies the matrices and stores the product in a third matrix. The product matrix is then printed to the screen. The program checks that the matrices can be multiplied by verifying that the number of columns of the first matrix matches the number of rows of the second.
This C program accepts student enrollment numbers, names, and aggregate marks. It ranks the students based on their marks, with the highest marks earning rank 1. The program then prints the enrollment number, name, mark, and rank of each student in ascending order of rank.
This C program accepts two strings as input and checks if the second string is a substring of the first string. If it is a substring, the program outputs the starting and ending locations of each occurrence of the substring in the main string. If the substring is not found, the program outputs "Not substring". It uses a while loop to iterate through the strings and compare characters to find substring matches and their positions.
The document contains code for three C programs:
1) A program to generate the first n terms of the Fibonacci sequence, where the sequence is defined as starting with 0, 1, and each subsequent term is the sum of the previous two terms.
2) A program that takes user input for a number n and prints all prime numbers between 1 and n by checking if each number is divisible by numbers between 1 and itself.
3) A program that takes a positive integer as input, calculates the sum of its individual digits by repeatedly taking the remainder and quotient of the number divided by 10, and prints the final sum.
The C program takes a binary number as input, finds its 2's complement by scanning from right to left and complementing all bits after the first 1, and prints the 2's complement as output. It first checks that the input is a valid binary number, then calls a complement() function that reverses the string, complements each bit, and handles carrying for adjacent bits.
This C program uses functions to perform operations on complex numbers represented as a structure with real and imaginary parts. It takes user input for two complex numbers, performs either addition or multiplication based on the user's selection, and displays the result. The main menu allows the user to choose addition or multiplication and calls the arithmetic function accordingly, which contains the code to perform the operation and display the output.
Ex.1 Write a program to print the following pattern
1
2 2
3 3 3
4 4 4 4
5 5 5 5 5
Ex.2 Write a program to find bigger of three integers.
Ex.3 Write a program to calculate GCD between two numbers.
Ex.4 Write a program to find transpose of matrix.
Ex.5 Write a program which deletes an element from an array & display all other elements.
Ex.6 Write a program to calculate XA+YB where A & B are matrix & X=2, Y=3.
Ex.7 Write a program to calculate the total amount of money in the piggy bank, given that coins of Rs.10, Rs.5, Rs.2, RS.1.
& many more.....
This C program allows a user to answer multiple choice questions (MCQs) and checks their answers. It prints out 5 questions, each with 3 possible answers, and prompts the user to enter the number of the correct answer. It then checks each submitted answer and prints whether it is true or false. This allows the program to automatically grade a short quiz consisting of basic MCQs.
This C program adds two numbers by first prompting the user to enter two integers, storing the input in variables a and b. It then calculates the sum of a and b, storing it in the variable c, and prints out the message "Sum of entered numbers" followed by the value of c.
This C program adds two numbers by first prompting the user to enter two integers, storing the input in variables a and b. It then calculates the sum of a and b, storing it in the variable c, and prints out the message "Sum of entered numbers" followed by the value of c.
This document contains C code examples that demonstrate both recursive and non-recursive solutions to common problems:
1) Towers of Hanoi problem using recursive and non-recursive functions.
2) Finding the greatest common divisor (GCD) of two integers using recursive and non-recursive functions.
3) Calculating the factorial of a given integer using recursive and non-recursive functions.
One dimensional operation of Array in C- language 9096308941
This C program allows the user to perform various operations on arrays, including insertion, deletion, sorting, searching, and displaying elements. The user is prompted to enter the number of values to store in an integer array. A menu is then displayed listing the available array operations. Based on the user's selection, the appropriate operation is performed, such as inserting a new element at a specified position, deleting an element, sorting the array, searching for a given value, or displaying all elements. This continues in a loop until the user chooses to exit the program.
This C program takes a user-input integer, adds the digits of that number together by taking the number modulo 10 at each iteration and dividing the number by 10, and prints out the sum of the digits. It prompts the user to enter an integer, uses a while loop to repeatedly take the remainder when dividing the number by 10 to extract each digit and add it to the running sum, and finally prints out the original number and total sum of its digits.
Insertion Sort is a simple data Sorting algorithm which sorts the array elements by shifting elements one by one and inserting each element into its proper position.
http://www.tutorial4us.com/data-structure/c-insertion-sort
This document contains code for two C programs. The first program asks the user to input two integer values, adds them together, and prints the sum. The second program asks the user to input a float value for the radius, calculates the area of a circle using that radius and PI, and prints the calculated area.
Pratik Bakane C++ programs...............This are programs desingedby sy diploma student from Governement Polytecnic Thane.....programsare very easy alongwith coding andscreen shot of the output
This document contains 3 examples of C programming code that demonstrate working with arrays: 1) Printing the reverse of user-input numbers in an array, 2) Separating even and odd numbers from an array into two new arrays, and 3) Merging and sorting two arrays of user-input numbers in descending order into a third array. Each example provides the full code, input/output examples, and brief descriptions to demonstrate array manipulation techniques in C.
1) The document contains 5 programming exercises involving recursive functions, factorials, loops, and switch/case statements.
2) For each exercise, the student is asked to compile and run the provided code, explain how it works, and make modifications as instructed.
3) Modifications include changing hardcoded values to user input, altering loop structures, and replacing switch/case with if/else statements.
The document describes the implementation of a math typesetting module in the Satyrographos programming language. It defines types like math and math-element to represent mathematical expressions. Functions like output and output-element are used to convert a math expression to a string by mapping over its elements. Special characters are wrapped in calls to make-char-info to handle properties like color. Let-math is used to define relational operators like ≤ by combining character, class, and color information.
This document discusses IoT data processing topologies and considerations. It begins by explaining the types of structured and unstructured data in IoT. It then discusses the importance of processing based on urgency and describes on-site, remote, and collaborative processing topologies. The document also covers IoT device design factors and processing offloading considerations including location, decision making, and other criteria.
This document discusses IoT sensing and actuation. It defines transduction as the process of energy conversion from one form to another. Sensors convert various forms of energy into electrical signals, while actuators convert electrical signals into various forms of energy, typically mechanical energy. The document describes different types of sensors and their characteristics like resolution, accuracy, and precision. It also discusses sensor errors and deviations. Finally, it categorizes sensing into four types - scalar sensing, multimedia sensing, hybrid sensing, and virtual sensing - based on the nature of the environment being sensed.
The document discusses the emergence of the Internet of Things (IoT). It describes how IoT has evolved from early technologies like automated teller machines and smart meters to modern applications across various domains. It also outlines the key characteristics of IoT and the complex interdependencies between IoT and related technologies like machine-to-machine communication, cyber physical systems, and the web of things. Finally, it explains the four planes that enable IoT - services, local connectivity, global connectivity, and processing - and how technologies like edge/fog computing facilitate IoT implementation.
This C program concatenates two strings entered by the user. It first allocates memory for the two input strings and a third string to hold the concatenated output. It then uses a for loop to copy the first string into the output string, leaves a space, and copies the second string into the remaining portion using another for loop. The concatenated string is then printed.
This document provides an introduction to information security. It outlines the objectives of understanding information security concepts and terms. The document discusses the history of information security beginning with early mainframe computers. It defines information security and explains the critical characteristics of information, including availability, accuracy, authenticity, confidentiality and integrity. The document also outlines approaches to implementing information security and the phases of the security systems development life cycle.
Mcs 012 computer organisation and assemly language programming- ignou assignm...Dr. Loganathan R
The document discusses various computer architecture concepts including:
1. A hypothetical new machine is described with 64 64-bit general purpose registers, 2GB of 32-bit memory, and instructions that are one or two memory words. Four addressing modes are needed: direct, index, base register, and stack to access variables and arrays.
2. Terms related to magnetic disk access are defined, including tracks, sectors, seek time, rotational latency, transfer time, and access time. Calculations are shown to find the average access time of 13.04ms for a 2048 byte sector disk rotating at 3000 RPM with a 64MB/s transfer rate.
3. Input/output techniques like programmed I/O,
Session 9 4 alp to display the current system time using dos int 21 hDr. Loganathan R
This program displays the current system time by using DOS interrupt 21H function 2CH to retrieve the time from the system. It breaks the time value into hours, minutes, seconds and stores each part separately before converting them to ASCII characters and displaying them along with a colon separator between each part to show the time as HH:MM:SS. The program ends by returning control back to DOS.
Session 9 1 alp to compute a grade using proceduresDr. Loganathan R
This program contains two procedures to calculate a student's grade. The first procedure calculates the total marks based on percentages from midterm, final project, quizzes and projects. The second procedure calculates the letter grade based on ranges of the total marks from A+ to F. User input for the marks is taken and overall grade is displayed.
The document appears to be a manual for Assembly Language Programming sessions 3 and 4. It provides 5 examples of Assembly Language programs with explanations. The programs cover topics like adding two numbers, reading and echoing a character, reading 10 characters from the console, exchanging memory variables using XCHG, and finding the sum of two BCD numbers stored in memory.
The document discusses requirements engineering processes. It describes the main activities as feasibility studies to determine if a project is worthwhile, elicitation and analysis to discover requirements, specification to formalize requirements, and validation to check requirements. It discusses techniques for eliciting requirements including interviews, scenarios, use cases and viewpoints to represent different stakeholder perspectives. The goal is to create and maintain requirements documents through these iterative processes.
MCS 012 computer organisation and assembly language programming assignment…Dr. Loganathan R
The document discusses binary arithmetic operations using 2's complement notation, conversion between number systems, UTF-8 encoding, designing logic circuits to count binary inputs, floating point number representation, RAM addressing, and input/output techniques. Examples of interrupt-driven and polling I/O are provided to explain how data can be read from keyboards and files.
The document discusses software requirements and requirements engineering. It introduces concepts like user requirements, system requirements, functional requirements, and non-functional requirements. It explains how requirements can be organized in a requirements document and the different types of stakeholders who read requirements. The document also discusses challenges in writing requirements precisely and provides examples of requirements specification for a library system called LIBSYS.
This document discusses software process models. It begins by outlining common activities like specification, design, validation and evolution. It then describes three generic process models: waterfall, evolutionary development, and component-based development. Waterfall involves separate sequential phases while evolutionary development interleaves activities. Component-based development focuses on reuse. The document also discusses process iteration techniques like incremental delivery and spiral development to accommodate changing requirements.
The document discusses critical systems and system dependability. It defines critical systems as systems where failure could result in significant economic losses, damage, or threats to human life. It describes four dimensions of dependability for critical systems: availability, reliability, safety, and security. It emphasizes that critical systems require trusted development methods to achieve high dependability.
The document discusses socio-technical systems and their key differences from technical computer systems. Socio-technical systems include technical, organizational and human elements. Emergent properties like reliability depend on complex interactions between system components and are difficult to predict. Systems engineering aims to design socio-technical systems to meet requirements while accounting for organizational factors. Legacy systems also present challenges due to their critical role and difficulty evolving over time.
This document discusses key topics in software engineering including its importance, costs, methods, challenges and professional responsibilities. It begins by outlining the objectives of understanding what software engineering is, its importance, and ethical issues. It then discusses that software costs, especially maintenance, often exceed development costs. Software engineering aims to improve cost-effectiveness. The document poses several frequently asked questions about software engineering and provides concise answers, covering topics such as the definition of software and differences between computer science, software engineering and system engineering. It also discusses software processes, costs, methods, CASE tools, attributes of good software and challenges in the field.
Understanding P–N Junction Semiconductors: A Beginner’s GuideGS Virdi
Dive into the fundamentals of P–N junctions, the heart of every diode and semiconductor device. In this concise presentation, Dr. G.S. Virdi (Former Chief Scientist, CSIR-CEERI Pilani) covers:
What Is a P–N Junction? Learn how P-type and N-type materials join to create a diode.
Depletion Region & Biasing: See how forward and reverse bias shape the voltage–current behavior.
V–I Characteristics: Understand the curve that defines diode operation.
Real-World Uses: Discover common applications in rectifiers, signal clipping, and more.
Ideal for electronics students, hobbyists, and engineers seeking a clear, practical introduction to P–N junction semiconductors.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 795 from Texas, New Mexico, Oklahoma, and Kansas. 95 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
The Pala kings were people-protectors. In fact, Gopal was elected to the throne only to end Matsya Nyaya. Bhagalpur Abhiledh states that Dharmapala imposed only fair taxes on the people. Rampala abolished the unjust taxes imposed by Bhima. The Pala rulers were lovers of learning. Vikramshila University was established by Dharmapala. He opened 50 other learning centers. A famous Buddhist scholar named Haribhadra was to be present in his court. Devpala appointed another Buddhist scholar named Veerdeva as the vice president of Nalanda Vihar. Among other scholars of this period, Sandhyakar Nandi, Chakrapani Dutta and Vajradatta are especially famous. Sandhyakar Nandi wrote the famous poem of this period 'Ramcharit'.
As of Mid to April Ending, I am building a new Reiki-Yoga Series. No worries, they are free workshops. So far, I have 3 presentations so its a gradual process. If interested visit: https://www.slideshare.net/YogaPrincess
https://ldmchapels.weebly.com
Blessings and Happy Spring. We are hitting Mid Season.
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetSritoma Majumder
Introduction
All the materials around us are made up of elements. These elements can be broadly divided into two major groups:
Metals
Non-Metals
Each group has its own unique physical and chemical properties. Let's understand them one by one.
Physical Properties
1. Appearance
Metals: Shiny (lustrous). Example: gold, silver, copper.
Non-metals: Dull appearance (except iodine, which is shiny).
2. Hardness
Metals: Generally hard. Example: iron.
Non-metals: Usually soft (except diamond, a form of carbon, which is very hard).
3. State
Metals: Mostly solids at room temperature (except mercury, which is a liquid).
Non-metals: Can be solids, liquids, or gases. Example: oxygen (gas), bromine (liquid), sulphur (solid).
4. Malleability
Metals: Can be hammered into thin sheets (malleable).
Non-metals: Not malleable. They break when hammered (brittle).
5. Ductility
Metals: Can be drawn into wires (ductile).
Non-metals: Not ductile.
6. Conductivity
Metals: Good conductors of heat and electricity.
Non-metals: Poor conductors (except graphite, which is a good conductor).
7. Sonorous Nature
Metals: Produce a ringing sound when struck.
Non-metals: Do not produce sound.
Chemical Properties
1. Reaction with Oxygen
Metals react with oxygen to form metal oxides.
These metal oxides are usually basic.
Non-metals react with oxygen to form non-metallic oxides.
These oxides are usually acidic.
2. Reaction with Water
Metals:
Some react vigorously (e.g., sodium).
Some react slowly (e.g., iron).
Some do not react at all (e.g., gold, silver).
Non-metals: Generally do not react with water.
3. Reaction with Acids
Metals react with acids to produce salt and hydrogen gas.
Non-metals: Do not react with acids.
4. Reaction with Bases
Some non-metals react with bases to form salts, but this is rare.
Metals generally do not react with bases directly (except amphoteric metals like aluminum and zinc).
Displacement Reaction
More reactive metals can displace less reactive metals from their salt solutions.
Uses of Metals
Iron: Making machines, tools, and buildings.
Aluminum: Used in aircraft, utensils.
Copper: Electrical wires.
Gold and Silver: Jewelry.
Zinc: Coating iron to prevent rusting (galvanization).
Uses of Non-Metals
Oxygen: Breathing.
Nitrogen: Fertilizers.
Chlorine: Water purification.
Carbon: Fuel (coal), steel-making (coke).
Iodine: Medicines.
Alloys
An alloy is a mixture of metals or a metal with a non-metal.
Alloys have improved properties like strength, resistance to rusting.
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsDrNidhiAgarwal
Unemployment is a major social problem, by which not only rural population have suffered but also urban population are suffered while they are literate having good qualification.The evil consequences like poverty, frustration, revolution
result in crimes and social disorganization. Therefore, it is
necessary that all efforts be made to have maximum.
employment facilities. The Government of India has already
announced that the question of payment of unemployment
allowance cannot be considered in India
Multi-currency in odoo accounting and Update exchange rates automatically in ...Celine George
Most business transactions use the currencies of several countries for financial operations. For global transactions, multi-currency management is essential for enabling international trade.
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schoolsdogden2
Algebra 1 is often described as a “gateway” class, a pivotal moment that can shape the rest of a student’s K–12 education. Early access is key: successfully completing Algebra 1 in middle school allows students to complete advanced math and science coursework in high school, which research shows lead to higher wages and lower rates of unemployment in adulthood.
Learn how The Atlanta Public Schools is using their data to create a more equitable enrollment in middle school Algebra classes.
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingCeline George
The Accounting module in Odoo 17 is a complete tool designed to manage all financial aspects of a business. Odoo offers a comprehensive set of tools for generating financial and tax reports, which are crucial for managing a company's finances and ensuring compliance with tax regulations.
1. S5-4
Write a program in ‘C’ language to implement a queue using two stacks.
#include<stdio.h>
int stak1[10], stak2[10], n, top,top1;
/*add elements to que*/
void add()
{
while(top>0)
{
scanf("%d",&n);
stak1[top]=n;
top++;
}
while(top<10)
{
stak2[top1]=stak1[top];
top1++; top--;
}
}
/*delete elements from que*/
void del()
{
int n;
while(top1>0)
n=stak2[top1];
top1--;
}
/*display elements*/
void display()
{
int i=top1;
while(i>0)
{
printf("n%d",stak2[i]);
i++;
}
}
main()
{
printf("nEnter 10 numbersn");
add();
display();
del();
printf("Elements in the que after deleting first elen");
display();
del();
printf("nElements after deleting second elen");
display();
getch();
}
Page 1