Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Software Q&A
Jobs
Ask a Question
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
0
votes
294
views
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+1
vote
1
answer
153
views
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
45
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
95
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
362
views
Two events A and B are such that P(A) = 0.5, P(B) = 0.3 and P(A ∩ B) = 0.1. Calculate
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
+2
votes
1
answer
100
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
147
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1).
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
1.1k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
922
views
In a large consignment of electric bulb 10% are defective.A random sample of 20 is taken for inspection.Find the probability that a)all are good bulbs b) there are almost 3 defective bulbs c)there are exactly 3 defective bulbs.
asked
Aug 31, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
162
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13, 2021
in
Hardware Systems & Electronics
by
anonymous
–1
vote
1
answer
1.0k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
151
views
Prove that if the number of Transistors is doubled, the increase in the performance of the processor will be in the region of 40% and discuss the relevance of this mathematical observation to multi-processor computing architecture design.
asked
Aug 26, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
476
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
190
views
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
156
views
A dinner plate has 25.12 inches of metal around it. What is the radius of the place using 3.14 for pie.
asked
Nov 22, 2021
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
1.1k
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
311
views
Read the narrative that follows and use it to answer question 5.1 and 5.2. 5.1 Identify all the relationships/business rules. (12) 5.2 Draw a domain class diagram.
asked
Jun 6, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
772
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
213
views
Suppose, there are N number of operations that have to be performed for a transaction. Now describe, in which state the (N-1) operations will be executed and what’s the name of N th operation for that specific transaction.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
0
votes
0
answers
151
views
For laminar flow in a tube with a constant wall heat flux, it can be shown that the microscopic energy equation can be reduced to the following form where qy is the heat flux in the y direction
asked
Oct 8, 2020
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
2.0k
views
If we treat 2 twos complement numbers as unsigned integers for purposes of addition, the result is correct if interpreted as a twos complement number. This is not true for multiplication.Why?
asked
Jan 3, 2020
in
Computer Architecture
by
anonymous
0
votes
0
answers
787
views
Consider a system consisting of processes P1, P2, ..., Pn, each of which has a unique priority number. Write a monitor that allocates three identical printers to these processes, using the priority numbers for deciding the order of allocation.
asked
Dec 10, 2020
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
502
views
Sketch and label the even and odd components of the signals shown in Fig. 1-24. Using Eqs. (1.5) and (1.6), the even and odd components of the signals shown in Fig. 1-24 are sketched in Fig. 1-25.
asked
Oct 28, 2020
in
Maths & Statistics
by
anonymous
0
votes
0
answers
391
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
794
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
740
views
Suppose you want to develop a software system as a software engineer. Identify the following requirements for your system • User requirements • System requirements •Functional requirements Non-functional requirements
asked
Aug 8, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
810
views
What factors have to be taken into account in the design of a menu-based interface for ‘walk-up’ systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
133
views
Suppose a coin is flipped 3 times. What is the probability of getting two tails and one head?
asked
Aug 31, 2021
in
Maths & Statistics
by
anonymous
+2
votes
1
answer
252
views
Suppose a coin is flipped 3 times. What is the probability of getting two tails and one head?
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
0
votes
1
answer
1.8k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
84
views
Let f : N → Y be a function defined as f(x) = 4x + 3, where, Y = {y ∈ N: y = 4x + 3 for some x ∈ N}. Show that f is invertible. Find the inverse.
asked
Sep 29, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
473
views
Calculate the checksum for the following bits: Data 1- 0110101111000100 Data 2- 1111010100001101 Data 3- A B C D
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.8k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
64
views
List three (3) open source engineering computational software tools that you would recommend as alternative to Matlab software for calculating the Grade Point Average (GPA) of 1000 students for each semester
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
+1
vote
1
answer
175
views
You play draughts against an opponent who is your equal. Which of the following is more likely: (a) winning three games out of four or winning five out of eight; (b) winning at least three out of four or at least five out of eight?
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
6.0k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
535
views
You have been asked to develop a system that will help with planning large-scale event and parties, using an activity diagram model the process context for such a system that shows the activities involved in planning a party
asked
Nov 10, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
848
views
You are responsible for the design of a communications switch that has to provide 24/7 availability, but which is not safety-critical. Giving reasons for your answer, suggest an architectural style that might be used for this system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
829
views
You are responsible for the design of a communications switch that has to provide 24/7 availability but that is not safety-critical...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
15.2k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
183
views
Suppose we draw a card from a deck of playing cards. What is the probability that we draw a spade?
asked
Aug 31, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
103
views
Suppose we draw a card from a deck of playing cards. What is the probability that we draw a spade?
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
465
views
Suppose you wish to encrypt the message, M = 42
asked
Sep 9, 2019
in
Programming Languages & Algorithms
by
anonymous
+3
votes
1
answer
777
views
Explain why you should explicitly handle all exceptions in a system that is intended to have a high level of availability.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
890
views
Explain why you should explicitly handle all exceptions in a system that is intended to have a high level of availability.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
39
views
Explain binomial theorem . Write down the binomial theorem for positive integral index and rational index ?
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
340
views
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
+2
votes
1
answer
1.4k
views
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
221
views
What is Routing Algorithm Metrics. Write all the following matrices that has been Used?
asked
Sep 6, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.3k
views
The principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
366
views
A fair coin is tossed, and a fair die is thrown. Write down sample spaces for (a) the toss of the coin; (b) the throw of the die; (c) the combination of these experiments.
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...