Are there any incremented values from one loop to the next?

What variables may be used to track each loop in the program?

Answers

Answer 1

Answer:

You can place any expression you'd like in the final expression of the for loop, but it is typically used to update the counter variable.

counter variable is used throughout those parts. That variable keeps track of the current repetition, and is typically named i . The initialization part initializes the counter variable to a starting value.

Explanation:


Related Questions

Write a method sameDashes that takes two Strings as parameters and that returns whether or not they have dashes in the same places (returning true if they do and returning false otherwise). For example, below are four pairs of Strings of equal length that have the same pattern of dashes. Notice that the last pair has no dashes at all.
string 1: "hi--there-you." "-15-389" "criminal-plan" "abc"
string 2: "12--(134)-7539" "-xy-zzy" "(206)555-1384" "9.8"
To be considered a match, the Strings must have exactly the same number of dashes in exactly the same positions. The Strings might be of different length. For example, the following calls should each return true:
sameDashes("1st-has-more characters", "2nd-has-less")
sameDashes("1st-has-less", "2nd-has-more characters")
because the Strings each have two dashes and they are in the same positions. But the following calls should each return falsebecause the longer string has a third dash where the shorter string does not:
sameDashes("1st-has-more-characters", "2nd-has-less")
sameDashes("1st-has-less", "2nd-has-more-characters")
Method problem: For this problem, you are supposed to write a Java method as described. You should notwrite a complete Java class; just write the method(s) described in the problem statement.

Answers

In Java that compares two strings for dashes. The test only returns true if each string has the same amount of dashes in the same position in the strings.

What is java? and how to write method described in problem statement?

Java is a programming language and computing platform first released by Sun Microsystems in 1995. It has evolved from humble beginnings to power a large share of today’s digital world, by providing the reliable platform upon which many services and applications are built. New, innovative products and digital services designed for the future continue to rely on Java, as well.Java is fast, secure, and reliable. Developers use Java to construct applications in laptops, data center's, game consoles, scientific supercomputers, cell phones, and other devices.

I have to write a program in Java that compares two strings for dashes. The test only returns true if each string has the same amount of dashes in the same position in the strings.

Comparing the following two strings

String string1 = "two-twenty-nine"

String string2 = "ten-forty-five and I'm hungry."

with the above criteria would return true. It doesn't matter whether one string is longer than the other.

Any assistance would be appreciated!

I have tried:

- converting the strings to char arrays and then comparing the indexes

- Using String. index Of() for each string, and then creating a variable int new Start = String. index Of() with the index of the previous dash as the new starting point to look from

public static void sameDashes(String string1, String string2) {

   int count = 0;

   char index1 = ' ';

   char index2 = ' ';

   char dash = '-';

   char[] string1Array = string1.toCharArray();

   char[] string2Array = string2.toCharArray();

   while (count < string1Array.length && count < string2Array.length) {

       if (string1Array[index1] == dash && string2Array[index2] == dash) {

           System. out. print ln("true");

To learn more about Java refers to ;

https://brainly.com/question/26789430

#SPJ4

A backup utility can write copies of important data files and folders on ____.
a. an internal hard disk drive
b. an Internet server’s disk drive
c. a network server’s disk drive
d. any of these

Answers

An internal hard drive, a network server's disk drive, or any of the following are all places where a backup program can store copies of crucial data files and folders.

is a short-range wireless technology that enables users to text or make calls using their hands-free?

In order to exchange data between stationary and mobile devices over short distances and to create personal area networks, Bluetooth is a short-range wireless technology standard (PANs).

What do we term a set of various application software packages that are offered as a unit?

When a set of connected software programs (such a collection of graphics programs, utility programs, or office-related software) is offered as a package, that group of software is referred to as a software suite.

To know more about backup program  visit :-

https://brainly.com/question/23653581

#SPJ4

Review at least two surveys about the use of agile methodologies, such as the annual survey on the state of agile by VersionOne. Also find a critical analysis of these surveys as they are sponsored by companies that sell agile products or surveys. Summarize your findings in a short paper

Answers

The annual survey on the State of Agile by VersionOne has been conducted since 2010.

Put your research findings in a concise paper.It surveys more than 6,000 agile practitioners and executives across different industries and geographic locations. The survey provides valuable insights into the adoption and use of agile methodologies, trends in agile practices, and the challenges and successes of agile teams.A critical analysis of the survey has been conducted by InfoQ, which is sponsored by companies that sell agile products. The analysis concludes that the survey is biased in favor of VersionOne's products, as some of the questions are designed to highlight the features of their products. It also points out that the survey does not include the perspectives of all stakeholders, such as customers and end-users, which limits its usefulness.Another survey on the use of agile methodologies is the annual State of Agile report by Scrum Alliance. The survey provides insights into the adoption and use of agile methodologies, trends in agile practices, and the challenges and successes of agile teams across different industries and geographies. A critical analysis of the survey has been conducted by InfoQ. The analysis points out that the survey is biased in favor of Scrum Alliance's products, as some of the questions are designed to highlight the features of their products. It also highlights the lack of diversity in the data set, which limits its usefulness. Overall, both surveys provide valuable insights into the adoption and use of agile methodologies, but it is important to be aware of the potential bias in the results and lack of diversity in the data set.

To learn more about the use of agile methodologies refer to:

https://brainly.com/question/13668097

#SPJ4

You are working on a computer named srv-2.forum.FootJob. What is the second level for this host name

Answers

Right-click Computer and select Properties from the menu that appears. Under Computer name, domain, and workgroup settings, the name of the computer is displayed.

What two types of domain names are there?

Generic top-level domains (gTLDs) and country-code top-level domains are the two primary categories into which TLDs are divided (ccTLDs). gTLDs, or generic top-level domains, are top-level domain names that specify the domain class they belong to (.com, . org, . edu, etc.).

Do you allow two-letter domains?

The majority of nations have a two-letter top-level domain (TLD) that corresponds to their country code. Germany has de, Canada has ca, while the United States has us.

To know more about domain visit:-

https://brainly.com/question/14508790

#SPJ4

what is a field on a table

Answers

Answer:

Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

What happens when you leave a tablet charging for two days?

Answers

I am sure it will get 100% on the tablet. Maybe if you leave it charging for 2 days it might overheat and cause a fire.

Explanation:

Left the tablet charging for 2 days.

Every time I try opening an image I get: 400. The server cannot process the request because it is malformed. It should not be retried. That's all we know.So what the heck does that mean, and how do I fix it?

Answers

An poorly written URL, syntax that is illegible or contains illegal characters, corrupted files in the web browser, or issues with voided browser cookies can all result in a 400 Bad Request error.

Describe a server :

A server sends, receives, and stores data. In fact, by offering, it "serves" another function. A server, which might be a system, software program, or simply a storage device, may provide one or more services.

Is a server software or hardware?

A server is a hub enabling other computers or programs to access services, data, or both. It can be made of components, software, or a combination of the two. The dedicated server is typically accessed via a network similar to the Internet.

To know more about Server visit :

https://brainly.com/question/7007432

#SPJ4

A 400 Bad Request error can be caused by a badly crafted URL, syntax that is difficult to read or contains illegal characters, damaged files in the web browser, problems with revoked browser cookies, and more.

What makes a server?

Data is sent, received, and stored by a server. In actuality, it "serves" another purpose by giving. A server, which might be a computer system, piece of software, or even just a storage device, could offer one or more services.

Is a server software or hardware?

Another computer or software can receive care, data, or both through a server, which acts as a hub. Components, software, or a mix of the two can be used to create it. A network resembling the Internet is frequently used to reach the dedicated server.

To know more about Server visit :

brainly.com/question/7007432

#SPJ4

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples

Answers

Destination unreachable time exceeded  represent message type.

An ICMP ping is what?

The message protocol used for the ping command is perhaps where ICMP is most well recognised. The target host receives an ICMP echo request when you use the ping command. An echo reply is given back by the target host.

What is an illustration of ICMP?

The Internet Control Message Protocol (ICMP) is a network protocol used for network management and troubleshooting. The "ping" utility, which makes use of an ICMP request and ICMP reply message, is an excellent example. An error message may be sent to the source by ICMP if a specific host or port cannot be reached.

To know more about ICMP visit

brainly.com/question/14689887

#SPJ4

You have a screen and a pen, which is an instance of the Turtle class.
What are the initial coordinates of the pen?
(100, 0)
(0,0)
(100, 100)
(0, 100)

Answers

Answer:

(0,0) and (0,100) (I think)

Explanation:

Answer:

(0,0)

Explanation: I got it right

What measures bandwidth in terms of numbers transferred or received per unit of time?
A. Connection time
B. Broadband
C. Protocol
D. Bit rate

Answers

Your answer is D bit rate I hope this helps

What is the term used for information about a computer file, distinct from the information it contains

Answers

Answer:

Metadata

Explanation:

This is type of data that provides information about other data, but not the content if the data, such as the text of a message or the image itself.

example of tools and components at home​

Answers

Answer:

SOLDER REMOVER

SOLDERING STATION

SOLDERING IRON

PRECISION SCREW DRIVER SET

The protocol data unit for the Physical layer of the OSI model is payload, or data.​
True
False

Answers

It is accurate to say that payload, or data, is the protocol data unit for the Physical layer of the OSI model. ​

What does the OSI physical layer's data unit go by?

A protocol data unit (PDU), an open-system interconnection (OSI) term used in communications, is a unit of data added or removed by a layer of the OSI model.

What does network layer protocol data unit mean?

A protocol data unit (PDU) is the fundamental unit of exchange in networking between entities that talk to one another utilizing a particular networking protocol. When addressing protocol interactions when working with a multilayer protocol stack, such as the TCP/IP networking suite, it is crucial to utilize the right PDU.

To know more about protocol data visit:-

https://brainly.com/question/14635177

#SPJ4

A customer uses an unencrypted wireless network. One of the users has shared a folder for access by any computer. The customer complains that files sometimes appear and disappear from the shared folder. Which of the following statements best describes how to fix the problem

Answers

A parallel, USB, or wireless interface is typically used by home computers to connect to printers. Network cables or wireless interfaces can be used by printers to connect to a network.

What is Common Printer Features?Serial : Single bits of information are moved in a single cycle through serial data transfer. Since dot matrix printers don't need to transport data at fast speeds, a serial connection can be used.Parallel : It is quicker to transport data in parallel than serially. A single cycle of parallel data transfer allows the movement of multiple bits of data. Data can move more quickly to or from the printer thanks to the broader data transfer path than with serial data transfer.Printers and other devices typically have a USB interface. A plug-and-play-compatible computer system will immediately detect and begin the driver installation process when a USB device is connected to it.FireWire : Platform independent high-speed communication bus called FireWire is also referred to as iLinc or IEEE 1394. Digital printers, scanners, hard disks, and other computing equipment can all be connected via FireWire.

To Learn more About wireless interface Refer To:

https://brainly.com/question/28399168

#SPJ4

What type of OS in firmware is designed to manage a specific device like a video game console?
a. network OS
b. client OS
c. workstation OS
d. appliance OS"

Answers

d. The firmware known as Appliance OS is created specifically to manage devices like video game consoles.

What particular program can check a computer for infections?

A class of software called antivirus software is created to stop, spot, and get rid of malware infections on specific computing devices, networks, and IT systems.

An OS for appliances is what?

An software appliances is a software program integrated with just enough JeOS (just enough operating system) to run effectively on server- or virtual machine-based hardware that meets industry standards.

To know more about Appliance OS visit:

https://brainly.com/question/29355582

#SPJ4

How do I fix The server cannot process the request because it is malformed. It should not be retried

Answers

The browser cache has to be cleaned in order to remedy this. To clear browsing data in Chrome, click the three dots symbol in the top right corner and choose More Tools from the popup menu.

Describe a server:

A computer program or apparatus that offers a service to another computer program and its user, also known as the client, is referred to as a server.

How does a server operate in a data center?

A server lacks a keyboard and screen. And although your computer keeps the files and data you've placed on it, a server keeps all the information related to the websites it hosts and makes it available to all computers and mobile devices—including yours—that need to access those websites.

To know more about server visit:

https://brainly.com/question/7007432

#SPJ4

#3: Which combination of statements can be used to express algorithms?
A) Iterative, sequential, and selection
B) Correctness, efficiency, and clarity
C) Readable, iterative, and efficient
D) Selection, conditional, and Boolean

Answers

Answer:

A) Iterative, sequential, and selection

Explanation:

write a program that will ask a user to enter a number between 1 and 10,000 and then report whether the number is prime.

Answers

To check if an integer n is prime, a rather straightforward approach is to verify if it is evenly divided by any integer from 2 to rootn. If none of them do, it is a prime; when you discover one that does, raise n.

What five prime numbers come to mind?

A whole number greater than 1 with only the number 1 and itself as factors is known as a prime number. A complete number that divides into another number equally is referred to as a factor. These are the first few prime numbers: 2, 3, 5, 7, 11, 13, 17, 19, 23, and 29.

What kind of program is this example of?

Users can generate and write documents using Microsoft Word, a word processing tool.

To know more about integer visit :-

https://brainly.com/question/15276410

#SPJ4

Which of the following is NOT a factor a secure VPN design should address?
Select one:
a. encryption
b. performance
c. nonrepudiation
d. authentication

Answers

c. Nonrepudiation is NOT an concern that a secure VPN design must take into account.

Which one of the following doesn't constitute a VPN connection type?

C is the proper response.Explanation:A predecessor of PPP, SLIP is a keypad connection protocol.Not a VPN protocol, it.

What are the 3 ways a VPN may be used?

VPNs employ one of three different types of protocols:an industry standard (such as IP).a protocol for tunneling (such as PPTP or L2TP).routers that can establish and keep up a large number of VPN tunnels for secure network connections.

To know more about nonrepudiation visit:

https://brainly.com/question/15187715

#SPJ4

True or False. Students should go to http://www.blackboard to log into Wake Tech's online courses.

Answers

To access Wake Tech's online courses, students should go to http://www.blackboard. False

When in the semester can a Wake Tech course be dropped?

Up until the advertised drop deadline, students can cancel their classes through Self-Service. Withdrawals are regarded as courses dropped after the final day to drop for the term and on or before the 60% date of the semester or term.

What should you try first if an online course is having technical issues?

If you have technological issues and are unable to finish a test, email your instructor right once. Include as much information as you can in your email (identify your browser, operating system, Internet Service Provider, time, date, circumstances, etc.

To know more about online courses visit:-

https://brainly.com/question/29574244

#SPJ4

class HashTable(): def __init__(self,nbuckets): pass def __len__(self): pass def __setitem__(self, key, value): pass

Answers

To determine the length of the instance attributes, utilize the magic method __len__. Now, the len(s) method internally calls the special method __len__() to return an object's length.

What does Excel properly?

Capitalizes the initial letter of a text string and any additional letters that come after any character other than a letter in the text. lowercase letters are used for all other letters.

Is the constructor _ init ?

Python classes have a reserved method called "__init__". In OOP principles, it is referred to as a constructor. When an object derived from the class is created, this method is called, enabling the class to initialize the attributes of the class.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ4

which of the following consists of rules and standards that define how a database organizes data?

Answers

Answer: The rules and standards that define how a database organizes data are called the database schema. The schema specifies the structure of the database, including the names and data types of the fields in each table, as well as any relationships between tables. It provides a blueprint for how the data is stored and accessed, and it helps to ensure the integrity and consistency of the data within the database. The schema is typically defined using a specialized language or tool, and it can be modified as needed to reflect changes in the data or the needs of the users.

to cut off part of the graphic in an illustration, you would _______ the illustration.

Answers

The prototype chosen for comparison won't be the same for every person, claims prototype theory.

A prototype is a pre-production version of a product created to test a concept or method. It is a phrase that is used in a wide range of situations, including semantics, design, electronics, and software development. Machine analysts and users frequently employ a prototype to assess a brand-new design that seeks to enhance precision. In cognitive science, particularly in psychology and cognitive linguistics, the prototype theory is a categorization notion in which certain contributors are more important than others and there is a graded credential of belonging to a conceptual class. According to the prototype theory, other objects fall within a category to the extent that they resemble the ideal instances (prototypes) that make up that category.

Learn more about Prototype here:

https://brainly.com/question/28187820

#SPJ4

The local Internet provider wants to develop a network that will connect its server at its satellite center in Valparaiso with the main city computer centers in Northwest Indiana to improve the Internet service and to minimize the amount of cable used to connect network nodes. If we represent this problem with a network:

Answers

The goal of the minimal spanning tree challenge is to connect every node in a network while minimizing the overall branch lengths.

What kind of data cable does the television industry use to transmit data and video signals?

Coaxial cables are able to transmit huge volumes of data as well as carry information in both directions. Only a small part of the bandwidth available through coaxial cables is used by cable television signals.

How is a computer connected to a network? What kind of connection is used?

A Local Area Network, or LAN, is a network of computers in a constrained space, such as a workplace, campus, or even your home, that is connected by Ethernet cables. The Ethernet connection from the internet provider is connected to the wireless router that is prevalent in many households.

To know more about LAN visit:-

https://brainly.com/question/13247301

#SPJ4

A technician has installed two new drives in one of the computers in the computer lab. Disk1 will be utilized for user and application data. Disk 2 has already been properly configured and has production data on in. The technician has been unable to format the appropriate disk from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that user's files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Answers

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

How to installed new drives in computers?Right click on disk 1, click on initializeChoose disk and option as MBR. Hit ok.Again, right click on disk 1 and choose convert to dynamic disk.Now right click on disk 1 and choose new simple volume.Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish.Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc GA user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.The lab requires that Disk1 be a dynamic disk configured with two partitionsThe first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G. The new partitions must be formatted to ensure that user â €™s files can be secured from other users and that the disk must be configured to account for future redundancy.Make sure to maintain a consistent file system.

To learn more about installed drives refers to;

https://brainly.com/question/14374281

#SPJ4

100 points
Read this article discussing the amount of time that people of various ages and education levels report spending on different technologies. Ask at least 12 of your adult friends and family members the same survey question. (The more people you ask, the better.)

How do your survey results compare with the results in the article? What are some possible reasons your results might be different? When comparing the results, be sure to take into account the margin of error for the survey discussed in the article.

Answers

My survey results overall varied quite a bit from the results in the article. Many of my survey respondents reported higher estimates than what was found in the article, especially in regards to the time spent on television. This may have been due to a response bias, as participants may have been overestimating the amount of leisure time activities they undertake. Additionally, the demographics of my survey respondents may have been different from that of the article - for example, my survey respondents were primarily from the United States

Why is color theory important?

Background information about the content is illustrated.
An explanation of design principles like font style and size is provided.
Mixtures and combinations of colors can either create visual appeal or visual chaos.
Viewers will form hypotheses based on colors and design.

Answers

Answer:

Mixtures and combinations of colors can either create visual appeal or visual chaos.

The answer is b. I believe

E-commerce refers to the use of any networking technologies to transact business
True
False

Answers

E-commerce does not necessarily refer to using networking technologies to do business, which is a false statement.

Which statement best describes e-commerce?

E-commerce is described as the exchange of money and data to complete sales while purchasing or selling products or services online. It is often referred to as online commerce or electronic commerce.

An e-commerce easy response is what?

E-commerce refers to the exchange of products and services over the internet. On the information superhighway, your bustling city center or physical store is being transformed into zeros and ones. Ecommerce, usually referred to as electronic commerce or internet commerce, is the term for the online purchase and sale of products and services as well as the exchange of financial instruments.

To know more about networking technologies visit:-

https://brainly.com/question/7499316

#SPJ4

Suppose a method p has the following heading: public static Circle p() Which return statement may be used in p()

Answers

The return statement used in p() and public static int[][] p() is return new int[][]{{1, 2, 3}, {2, 4, 5}}.

What is static keyword in a Java program?Static indicates that a member belongs to a type itself, not to an instance of that type, in the Java programming language. This indicates that we'll only construct one instance of the static member, which will be used by all class instances. A Java program's static keyword denotes the primary method's status as a class method. This suggests that you don't require a class instance to access this method as well. The public keyword ensures that the method is available to all classes, so it is possible. Similar to an abstract, sealed class is a static class. A static class is different from a non-static class in that it cannot be instantiated or inherited, and all of its members are static.

The complete question is,
suppose a method p has the following heading. what return statement may be used in p()? public static int[][] p()

To learn more about Java program refer to:

https://brainly.com/question/26642771

#SPJ4

application software that is intended for use in a specialized business environment is called ____.

Answers

Application software that is intended for use in a specialized business environment is called an industry-specific application.

What is Application software?

Application software may be characterized as a type of computer software package that performs a specific function directly for an end user or, in some cases, for another application. An application can be self-contained or a group of programs.

An application program is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself. This type of software is specifically designed in order to handle specific tasks for users.

Such software directs the computer to execute commands given by the user and may be said to include any program that processes data for a user.

Therefore, application software that is intended for use in a specialized business environment is called an industry-specific application.

To learn more about Application software, refer to the link:

https://brainly.com/question/29032671

#SPJ1

Other Questions
Mr. Gutierrez had $100 to purchase candy for his students that completed their work. Hebought 8 bags of jolly ranchers and 25 bags of assorted chocolate. Each bag of jollyranchers cost $3.25, and each bag of assorted chocolate cost $2.10. How much moneydid Mr. Gutierrez have left over after these purchases? Find the missing values in the ratio table then write the equivalent ratios in the order they appear in the table 3/4 1/3 2/3 3 1 Claudia is making a gelatin dessert for a party. She plans on making 12 servings for every 5 people. If each pan Claudia uses to make the dessert holds 8 servings, what is the minimum number of these pans that she needs in order to make enough to feed 10 people? Ill give brainliest!! Please explain how to do these 7. A monopolist has cost function = + 2 and the regulator is willing to allow the firm to use a two-part tariff per consumer = + to cover total costs. Total demand is = 102 and there are 100 identical consumers. Up to how much is willing to pay each indidual consumer to have the right to consume the good at marginal cost? What is the optimal tariff or tariff that would maximize social welfare (fixed part and marginal price) ? Bill Jorden has a 48-month installment loan with a fixed monthly payment of$176.14. The amount borrowed was $7500. Instead of making the 24" payment,Bill is paying off the rest of the loan. What is the total amount due to pay off theloan The product of 2 3 and 312 in simplified form is . In regression analysis, which of the following is not a required assumption about the error term e?AnswerO The expected value of the error term is zero.O The variance of the error term is the same for all values of x.O The values of the error term are independent.O All are required assumptions about the error term. Question 5 of 10 What is one of the major factors contributing to the global water crisis? A. A global decrease in urban population densities O B. The contamination of river water by industrial pollution O C. The spread of desalinization plants around the world O D. The introduction of sanitation systems in impoverished countries spreadsheets are a common tool for cost estimating, cost budgeting, and cost control. Look at the pictureWhat is colorism essay by David knight Can u please help......,,,.... When women entered the workforce after World War II What was an obstacle they faced? Please help .............. Please help me asap!! Evaluate the expression. Write your answer in scientific notation. 1. 4.1x10^3) + (3.7x10^2)2. (1.2x10^(3))*(4x10^(5)) WILL GIVE BRAINLIEST PLEASE HELP ASAP!! A and \angle BB are vertical angles. If m\angle A=(2x-4)^{\circ}A=(2x4) and m\angle B=(x+1)^{\circ}B=(x+1) , then find the value of x. The sum of the interior angles of a polygon is 20 x 180. Work out the number of sides of the polygon. sides when writing an essay, what is the best way to psychologically convince someone? Which of the following feedbacks can be either positive or negative?1) Greenhouse gas feedback 2) Blackbody radiation feedback3) Cloud cover feedback4) Ice-albedo feedbackHURRY UP IT IS NEEDED RIGHT NOW!!!!