How many ways can a selection of 6 coloured balls be made

Assignment Help Computer Network Security
Reference no: EM13923106

1. Use Mathematical Induction to prove the following:

(i) n3 - n is divisible by 3, for all integers n ≥ 1;

(ii) 1 + 3 + 5 + ? + (2n - 1) = n2 for all integers n ≥ 1.

2. How many positive integers between 100 and 699 inclusive

(i) have the same first and third digits?

(ii) are divisible by 4?

(iii) are divisible by 6? 

(iv) are divisible by both 4 and 6?

(v) are divisible by either 4 or 6?

(vi) are divisible by 6 but not by 4?

3. Given that A = {1, 2, 3, 4} and B = {5, 6, 7, 8, 9}, how many functions f: A → B are there
(i) in total?

(ii) which are one-to-one?

(iii) with f(1) = 5, f(2) = 6 and f(3) = 7?

(iv) with f(1) ≠ 5, and f(3) ≠ 7 ?

4. (i) At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need?

(ii) How many people must you have to ensure that at least 12 of them have the same birthday (assume 366 possible birthdays)?

5. A ship's crew is to be selected from 25 people. There are 5 captains, 7 leading hands, 5 midshipmen and 8 ordinary sailors available. If the crew is to consist of 1 captain, 2 leading hands, 3 midshipmen and 4 ordinary sailors, in how many different ways can the crew be formed?

6. Find the coefficient of x27y2 in the expansion of (-x - 3y)29.

7. In how many different ways can a selection of 6 coloured balls be made from a barrel containing red, green, yellow and blue balls and the selection must contain at least 2 blue balls?

8. Using all the letters, find the number of different strings that can be formed from the word: ARKAROOLA

9. For each of the following relations R on the set A = {2, 4, 6, 8, 10}, determine (give reasons) whether R is:

(a) reflexive; (b) symmetric; (c) transitive (i) R = {(2,2), (2,4), (4,2), (4,6), (2,6), (6,4), (6,2)}

(ii) R = {(2,2), (4,4), (6,6), (8,8), (10,10), (2,4), (4,6), (2,6)}

(iii) R = {(2,10), (10,2), (4,8), (8,4), (6,6)}

Reference no: EM13923106

Questions Cloud

How the accounting equation relates to the components : Provide examples that show how the components of the accounting equation affect each other and how transactions affect the accounting equation.
Initial cash outlay necessary to replace existing equipment : A company is evaluating the possible replacement of equipment. New equipment would cost $92,325, and sales tax on the purchase would be 6%. Both the purchase price and sales tax would be capitalized. What is the initial cash outlay necessary to repla..
Components of ethics legality and fairness : With your analysis complete, prepare a brief summary in which you relate the components of ethics, legality, and fairness in decision making
What is the break-even price for the new phone : Conch Republic Electronics is a midsized electronics manufacturer located in Key West, Florida. The company president is Shelley Couts, who inherited the company. When it was founded over 70 years ago, the company originally repaired radios and other..
How many ways can a selection of 6 coloured balls be made : At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different ways can a selection of 6 coloured balls be made from a barrel containing red..
Identify and describe the historical event : Identify and describe the historical event. Analyze the historical and contemporary causes of the event. Analyze different historical interpretations of this event. Evaluate the later consequences of this event. The final paper should be 8-10 page..
Data to make informed decisions : A firm's financial statements can tell you a lot about them, but exactly what does that mean and how can financial managers use this data to make informed decisions? Which statements do you feel reveal the most useful information and why?
Firm purchased equipment three years : A firm purchased equipment three years ago for $22,047. Accumulated depreciation is $10,558, and the firm's tax rate is 29%. If the equipment is sold today for $17,406, how much net cash flow would be generated? Round your answer to the nearest whole..
Familiar with in process from start to finish : Choose an item that you would like to manufacture. You do not actually need to manufacture something, but will proceed through the assignment as if you were planning on manufacturing the item you have selected.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  You may use various sources be sure to cite any sources

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources. be

  Briefly analyse the candidates - mac, dac and rbac

Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on the application requirements.

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Analyze any potential physical vulnerabilities and threats

You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. Identify and analyze any potential physical vulnerabilities and threats that require consideration

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  Information security

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters.

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd