Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Computer Engineer Jobs
Ask a Question
What is the response of the system, y(n) = x(n-2), to the input 4 points Captionless Image
0
votes
198
views
asked
in
Others
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
0
votes
0
answers
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Consider the simple signal processing system shown in Fig. P1.ll. The sampling periods of the AID and DIA converters are 7 = 5 ms and 7' = 1 ms, respectively. Determine the output y,,(r) of the system. if the input is
asked
in
Hardware Systems & Electronics
by
anonymous
–1
vote
1
answer
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
The analog signal is given as x(t)= 2 sin 480t + 3 sin 720t. Calculate 1) Maximum Frequency ii) Nyquist Rate iii) Sampling Theroum
asked
in
Others
by
anonymous
0
votes
0
answers
A firm has asked you to build an expert system to diagnose problems with one of their production lines. They also offered you an expert system development tool. What is your response and why?
asked
in
Artificial Intelligence
by
anonymous
0
votes
0
answers
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
in
Computer Networks
by
anonymous
+1
vote
1
answer
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1).
asked
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
in
Maths & Statistics
by
(user.guest)
0
votes
1
answer
Argue that for the distance-vector algorithm in Figure 4.30, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps.
asked
in
Computer Networks
by
(user.guest)
0
votes
0
answers
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
A fair coin is flipped three times. Let S be the sample space of the eight possible outcomes, and let X be the random variable that assigns to an outcome the number of heads in this outcome. What is the expected value of X?
asked
in
Maths & Statistics
by
anonymous
–1
vote
1
answer
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally.
asked
in
Software Engineering
by
anonymous
–1
vote
1
answer
Duplicate: You have been asked to prepare and deliver a presentation to a non-technical manager to justify the hiring of a system architect for a new project. Write a list of bullet points setting out the key points in your presentation. Naturally,
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
Consider you have 10 data packet from 0 to 9. In Go-back-N and Selective repeat both have window size of 5. While transferring packet, ACK2 is lost. What will happened then? Show the scenario with proper figure.
asked
in
Computer Networks
by
anonymous
0
votes
1
answer
Looking at Figure 4.27, enumerate the paths from y to u that do not contain any loops.
asked
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
in
Maths & Statistics
by
(user.guest)
0
votes
0
answers
Consider the K-means cost function for clustering N d-dimensional data points into K clusters. Compute the optimal parameters when K = 1. Derive the optimal parameters of the model when K = N.
asked
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
in
Computer Networks
by
anonymous
0
votes
1
answer
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
Classify the following signals according to whether they are (1) one- or multi-dimen-sional; (2) single or multichannel, (3) continuous time or discrete time, and (4) analog or digital (in amplitude)
asked
in
Hardware Systems & Electronics
by
anonymous
+3
votes
1
answer
A process X is a normally distributed population with mean = 14 and variance 16. Determine the probability that 14 objects selected will have mean is greater than 15.2.
asked
in
Maths & Statistics
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A software process that is based on high quality should produce high quality software products but to manage the quality of a system many problems are faced, what are these probable problems?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
What is the purpose to make Context Model. Draw Context Model of Flight Management System
asked
in
Software Engineering
by
(user.guest)
+3
votes
1
answer
Under what circumstances might an organization decide to scrap a system when the system assessment suggests that it is of high quality and high business value?
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Under what circumstances might an organization decide to scrap a system when the system assessment suggests that it is of high quality and high business value?
asked
in
Software Engineering
by
anonymous
0
votes
0
answers
A manager decides to use the reports of program inspections as an input to the staff appraisal process. These reports show who made and who discovered program errors. Is this ethical managerial behavior?
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
in
Maths & Statistics
by
anonymous
0
votes
0
answers
i) State and prove convolution property of DFT. (8) ii) Find the inverse DFT of X(k) = {6, –1 –2j, –2, –1 + 2j}.
asked
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
asked
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
Signals will be exchanged between at the___________ of the TCP/IP Model? 1- network layer 2-data link layer 3-physical layer 4-application laye
asked
in
Computer Networks
by
anonymous
+2
votes
1
answer
Find the net ID and host ID of the following IP Addresses? I. 114.34.2.8 II. 19.34.21.5 III. 23.67.12.1 IV. 127.23.4.0 V. 192.34.5.1
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
Find the Eulerian number, (n k ) where n = 6 &k =2. List down the rows of permutation
asked
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
What is 2-Dimensional transformation?
asked
in
Others
by
(user.guest)
0
votes
0
answers
TWO (2) main problem dealing with I/O devices to ensure the performance of the CPU is remaining high
asked
in
Computer Architecture
by
anonymous
+1
vote
1
answer
An urn contains 6 red marbles and 4 black marbles.are drawn without replacement from the urn. What is the probability that both of the marbles are black? Two marbles
asked
in
Maths & Statistics
by
(user.guest)
–1
vote
1
answer
Duplicate: Write a set of nonfunctional requirements for the drone system setting out its expected safety and response time
asked
in
Software Engineering
by
anonymous
+3
votes
3
answers
Write a set of non-functional requirements for the drone system, setting out its expected safety and response time.
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
Write a set of non-functional requirements for the ticket-issuing system, setting out its expected reliability and response time.
asked
in
Software Engineering
by
anonymous
+3
votes
1
answer
If a port number is 16 bits (2 bytes), what is the minimum header size at transport layer of the TCP/IP protocol suite?
asked
in
Computer Networks
by
anonymous
0
votes
0
answers
For laminar flow in a tube with a constant wall heat flux, it can be shown that the microscopic energy equation can be reduced to the following form where qy is the heat flux in the y direction
asked
in
Maths & Statistics
by
(user.guest)
0
votes
0
answers
Analyze the common social criticisms of marketing (at least 2). use the case
asked
in
Others
by
(user.guest)
+1
vote
0
answers
Use the trial control limits from part (a) to identify out of control points. If necessary, revise your control limits, assuming that any samples that plot outside the control limits can be eliminated
asked
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
in
Maths & Statistics
by
(user.guest)
0
votes
1
answer
What can be the steps you may take in these four categories to ensure that the system in development is dependable?
asked
in
Software Engineering
by
anonymous
+1
vote
1
answer
What is a Hotel Management System
asked
in
Others
by
anonymous
0
votes
0
answers
Verification and Validation (V&V) is intended to show that a system both conforms to its specification and that it meets the expectations of the system customer. Diagrammatically explain the approaches of the testing.
asked
in
Software Engineering
by
anonymous
–1
vote
1
answer
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
in
Software Engineering
by
anonymous
Welcome to
CPEN Talk
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
Trending Searches
For+The+Following+Signals,+Determine+I...
consider a machine with 1 mb physical ...
you have taken a job with a software u...
5.in bittorrent, suppose alice provid...
write two objectives of os
what is the probability that a node wi...
...