fdf3213

Psihologija je ljudska moć samorazmatranja. Termin „psihologija“ se vezuje za značenje „proučavanje duše“ i potiče od PSIHE (duh, duša, um, dah…) i LOGOS (nauka, studija, rasuđivanje). Simbol psihologije je grčko slovo Ψ (psi). Psihologija kao nauka proučava psihičke procese (subjektivne doživljaje), fizičke uslove njihovog nastajanja i načine njihovog ispoljavanja (reakcije, ponašanja). Psihički život ljudi obuhvata kogniciju, konaciju i emocije. @

Centralni nervni sistem

...

See on Wikiteka »

Heheh

2

RJ Malishka Mendonsa – Contemporary Radio Personality in India*Popular radio jockey associated with Red FM 93.5, Mumbai *Hosts the famous morning show “Morning No.1 with Malishka” *Known for an energetic, humorous, bold and relatableon-air style Combines music, comedy, civic issues and listener interaction *Aims to “feel the pulse of the city” by addressing urban life and problems *Represents the evolution of RJ from announcer to social influencer *Uses radio as a platform for public

...

See on Student Notes »

adasdasd

struct node {
int coeff;
int x_exp, y_exp, z_exp, z;
struct node *next;
};
struct node *poly1 = NULL;
struct node* insertTerm(int coeff, int x_exp, int y_exp, int z_exp, struct node *poly) {
struct node *newTerm = (struct node *)malloc(sizeof(struct node));
newTerm->coeff = coeff;
newTerm->x_exp = x_exp;
newTerm->y_exp = y_exp;
newTerm->z_exp = z_exp;
if (poly == NULL) {
poly = newTerm;
newTerm->next = poly;
} else {
struct node *temp = poly;
while (temp-&
...

See on Student Notes »

TQM12

1)Definition of leadership:  a leader as one who instills purposes, not one who controls by brute force. A leader strengthens and inspires the followers to accomplish shared goals. Leader shape the organization's values, promote the organization's values ll Characteristics of Quality Leaders: 1. They give priority attention to external and internal customers and their needs. Leaders place them-selves in the customers' shoes and service their needs from that perspective. ll 2. They empower, rather

...

See on Student Notes »

Neuro2

BELLS PALSY Etiology: idiopathic; commonly associated with HSV-1, VZV; autoimmune inflammation or ischemia suspected; sporadic outbreaks reported.Clinical features: mastoid/ear pain precedes weakness by 1–2 days; rapid onset facial weakness within 48 h; loss of forehead wrinkling and eye closure; impaired taste (anterior 2/3 tongue); hyperacusis (stapedius paralysis); ↓ salivation; lacrimation usually preserved; Bell’s phenomenon (upward/outward eye movement on attempted closure).Diagnosis:

...

See on Student Notes »

Yyyyyyyy

Impact of Global Trade and Finance on Contemporary International Relations
Global trade and finance play a central role in shaping contemporary international relations. In an increasingly interconnected world, economic interdependence has become a major factor influencing diplomacy, foreign policy, and global power structures. The flow of goods, services, capital, and investments across borders has transformed how states interact with one another.
1. Economic Interdependence and Cooperation
Global

...

See on Student Notes »

sdadasd


#include <stdio.h>
void tower_hanoi(int n, char src, char dest, char temp) {
if (n == 1) {
printf("\nMove disk %d from peg %c to peg %c", n, src, dest);
return;
}
tower_hanoi(n - 1, src, temp, dest);
printf("\nMove disk %d from peg %c to peg %c", n, src, dest);
tower_hanoi(n - 1, temp, dest, src);
}
int main() {
int n;
printf("\nEnter the number of disks: ");
scanf("%d", &n);
tower_hanoi(n, 'A', 'B', 'C');
return 0;
}
#include <stdio.h>
#include <stdlib.h>
struct student
...

See on Student Notes »

asjdbkqwj,dm

m5)Explain the role of high-security requirements in IoT automation systems. Why is security
more critical today???

1. IoT automation systems control physical processes, so security failures can cause real-world damage.
2. High security ensures that only trusted devices, users, and services can access the system.
3. Authentication is used to verify the identity of IoT devices and users.
4. Authorization controls what actions an authenticated system is allowed to perform.
5. Secure communication protects

...

See on Student Notes »

operatiing system

#include <stdio.h> 
#include <sys/types.h>        1(a)
#include <unistd.h> 
int main() { 
pid_t pid, mypid, myppid;

pid = getpid(); 
printf("Before fork: Process id is %d\n", pid);

pid = fork(); 
if (pid < 0) { 
perror("fork() failure\n");

return 1; } 
process if (pid == 0) { 
printf("This is child process\n");

mypid = getpid(); 
myppid = getppid(); 
printf("Process id is %d and PPID is %d\n", mypid, myppid); }

else {  sleep(2); 
printf("This is parent process\n");

mypid

...

See on Student Notes »