#P7055. [NWRRC 2015] Hash Code Hacker

[NWRRC 2015] Hash Code Hacker

Description

According to Java standard library documentation, the hash code of String is computed as

$s[0] \times 31 ^ {n -1} + s[1] \times 31 ^ {n -2} + \cdots + s[n -1]$

Here s[i]s[i] is the i-th character of the string, nn is the length of the string, and ^ indicates exponentiation. Computation uses signed 32bit32-bit integers in two's complement form.

Heather is going to hack the servers of Not Entirely Evil Recording Company (NEERC).(NEERC). To perform an attack she needs kk distinct query strings that have equal hash codes. Unfortunately, NEERC servers accept query string containing lower- and uppercase English letters only.

Heather hired you to write a program that generates such query strings for her.

Input Format

The single line of the input file contains integer kk -- the number of required query strings to generate (2k1000)(2 \le k \le 1000) .

Output Format

Output kk lines. Each line should contain a single query string. Each query string should be non-empty and its length should not exceed 10001000 characters. Query string should contain only lower- and uppercase English letters. All query strings should be distinct and should have equal hash codes.

4

edHs
mENAGeS
fEHs
edIT

Hint

Time limit: 2 s, Memory limit: 256 MB.