Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Software Q&A
Jobs
Ask a Question
Let f : N → Y be a function defined as f(x) = 4x + 3, where, Y = {y ∈ N: y = 4x + 3 for some x ∈ N}. Show that f is invertible. Find the inverse.
0
votes
85
views
asked
Sep 29, 2021
in
Maths & Statistics
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+1
vote
1
answer
45
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
96
views
Suppose X is N(µ, σ2 ). For a = 1, 2, 3 find P(|X − µ| < aσ).
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
151
views
For laminar flow in a tube with a constant wall heat flux, it can be shown that the microscopic energy equation can be reduced to the following form where qy is the heat flux in the y direction
asked
Oct 8, 2020
in
Maths & Statistics
by
(user.guest)
+2
votes
1
answer
101
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
148
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1).
asked
Aug 27, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
469
views
A fair coin is flipped three times. Let S be the sample space of the eight possible outcomes, and let X be the random variable that assigns to an outcome the number of heads in this outcome. What is the expected value of X?
asked
Jul 26, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
167
views
Let X be a random variable with EX2 < ∞ and let Y = |X|.
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
930
views
In a large consignment of electric bulb 10% are defective.A random sample of 20 is taken for inspection.Find the probability that a)all are good bulbs b) there are almost 3 defective bulbs c)there are exactly 3 defective bulbs.
asked
Aug 31, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
155
views
Suppose X is N(10, 1). Find (i) P[X > 10.5], (ii) P[9.5 < X < 11], (iii) x such that P[X < x] = 0.95. You will need to use Standard Normal tables?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
122
views
Let {Xn} and {Yn} be sequences of random variables such that Xn diverges to ∞ in probability and Yn is bounded in probability. Show that Xn + Yn diverges to ∞ in probability.
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
193
views
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
485
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
237
views
In one case a byte is defined as a sequence of 8 bits. Each bit can be either zero or one. How many different bytes are possible?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
295
views
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
0
votes
0
answers
105
views
Find the Eulerian number, (n k ) where n = 6 &k =2. List down the rows of permutation
asked
Nov 29, 2020
in
Maths & Statistics
by
(user.guest)
0
votes
1
answer
812
views
Suppose ASs X and Z are not directly connected but instead are connected by AS Y. Further suppose that X has a peering agreement with Y, and that Y has a peering agreement with Z.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
273
views
What is the response of the system, y(n) = x(n-2), to the input 4 points Captionless Image
asked
Apr 27, 2021
in
Others
by
anonymous
0
votes
0
answers
395
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
808
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
796
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.4k
views
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
15.3k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
335
views
A process X is a normally distributed population with mean = 14 and variance 16. Determine the probability that 14 objects selected will have mean is greater than 15.2.
asked
Aug 25, 2020
in
Maths & Statistics
by
anonymous
0
votes
0
answers
158
views
i) State and prove convolution property of DFT. (8) ii) Find the inverse DFT of X(k) = {6, –1 –2j, –2, –1 + 2j}.
asked
Jul 19, 2021
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
297
views
What does a model in a software engineering can be defined as an abstraction of a system that has no longer exists, an existing system and future system to be built means?
asked
Mar 30, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
214
views
Suppose, there are N number of operations that have to be performed for a transaction. Now describe, in which state the (N-1) operations will be executed and what’s the name of N th operation for that specific transaction.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
+1
vote
1
answer
1.6k
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
156
views
A dinner plate has 25.12 inches of metal around it. What is the radius of the place using 3.14 for pie.
asked
Nov 22, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
75
views
A bag contains 5 red and 4 blue identical balls, if two are selected at random, one after the other, with replacement, find the probability that the first ball is red and the second is blue
asked
Dec 5, 2021
in
Maths & Statistics
by
(user.guest)
+2
votes
1
answer
757
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.6k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
443
views
The analog signal is given as x(t)= 2 sin 480t + 3 sin 720t. Calculate 1) Maximum Frequency ii) Nyquist Rate iii) Sampling Theroum
asked
Mar 3, 2021
in
Others
by
anonymous
0
votes
0
answers
188
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
168
views
A network with two nodes let it be A and B. Node A wants to send data 111001010 to node B using Hamming error detection technique. Find the code word generated by node A.
asked
Jun 16, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
350
views
Duplicate: Identify and briefly describes four types of requirement that may be defined for a computer based system.
asked
May 27, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
723
views
Duplicate: Identify and briefly describe four types of requirement that may be defined for a computer based system.
asked
Jul 8, 2020
in
Software Engineering
by
anonymous
+4
votes
1
answer
11.6k
views
Identify and briefly describe four types of requirements that may be defined for a computer-based system.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
786
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
0
votes
1
answer
698
views
Argue that for the distance-vector algorithm in Figure 4.30, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps.
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.0k
views
What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
255
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
829
views
What factors have to be taken into account in the design of a menu-based interface for ‘walk-up’ systems such as bank ATMs? Write a critical commentary on the interface of an ATM that you use.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
0
answers
220
views
How can standards (the 'what') and other information be used to develop a methodology/approach/framework for managing projects (the 'how')? Describe some of this "other information" that can be used to create a methodology.
asked
Jul 7, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.2k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.8k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.9k
views
Imagine a situation where 2 developers are simultaneously modifying 3 different software components. What difficulties might arise when they try to merge the changes that they have made?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
65
views
List three (3) open source engineering computational software tools that you would recommend as alternative to Matlab software for calculating the Grade Point Average (GPA) of 1000 students for each semester
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
0
votes
1
answer
301
views
Write a SQL view to show the pid and movieid where the name of the actor is ‘Tom Hanks’ and the movie must belong to the ‘Action’ Genre.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
+1
vote
1
answer
134
views
Given that 0.04% of vehicles break down when driving through a certain tunnel find the probability of (a) no (b) at least two breakdowns in an hour when 2,000 vehicles enter the tunnel?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
118
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...