Which pairs of operations commute

Assignment Help Basic Computer Science
Reference no: EM131212735

Suppose for sake of argument that database elements are two-dimensional vectors. There are four operations we can perform on vectors, and each will have its own type of lock.

i. Change the value along the x-axis (an X-lock).

ii. Change the value along the y-axis (a F-lock).

iii. Change the angle of the vector (an A-lock).

iv. Change the magnitude of the vector (an M-lock).

Answer the following questions.

a) Which pairs of operations commute? For example, if we rotate the vector so its angle is 120° and then change the coordinate to be 10, is that the same as first changing the x-coordinate to 10 and then changing the angle to 120°?

b) Based on your answer to (a), what is the compatibility matrix for the four types of locks?

c) Suppose we changed the four operations so that instead of giving new values for a measure, the operations incremented the measure (e.g., "add 10 to the coordinate," or "rotate the vector 30° clockwise"). What would the compatibility matrix then be?

Reference no: EM131212735

Questions Cloud

Identify historical events that led to the implementation : Identify historical events that led to the implementation of current standards. Analyze how these events and standards are correlated and the impact that they have on the accounting profession in Germany today.
How many interleavings of transactions are serializable : If the order of incrementation in T2 were reversed [i.e., inc2 (B) followed by inc2 {A)], how many serializable interleavings would there be?
Judicial precedents set by earlier decisions : Why do courts generally adhere to the judicial precedents set by earlier decisions?
Describe transformation of graph of asia with north america : Describe the transformation of the graph of Asia with North America. Do the graphs have horizontal asymptotes? How about vertical asymptotes? At what size, x(in megabytes), will the consumerratings be equal to 0 in Asia?
Which pairs of operations commute : Suppose for sake of argument that database elements are two-dimensional vectors. There are four operations we can perform on vectors, and each will have its own type of lock.
Type of marketing research : Question 1: What type of marketing research should Samsonite undertake and why?
Brief analysis of consumer perceptions and behaviour : HI5004 Marketing Management - You can select any small to medium size manufacturing in Australia -Clear and concise target market, segments and positioning (includes positioning mapping) followed by the company
What is the compatibility matrix for the four types of locks : Suppose for sake of argument that database elements are two-dimensional vectors. There are four operations we can perform on vectors, and each will have its own type of lock.
Problem regarding the marketing plan : What is the best way to measure whether or not your marketing plan is working?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Does technology require a knowledge elite

Does technology require a knowledge "elite"? How does this affect the distribution of resources globally?

  Explaining distributed music in physical cds and mp3 files

For some time, popular music has been distributed on physical CDs. It can now be distributed in MP3 files. Explain the nature of the similarity or difference.

  Determining the annual probability of success

Suppose that an attack would do $100,000 in damage and has a 15% annual probability of success. Spending $9,000 per year on "Measure A" would cut the annual probability of success by 75%. Do a risk analysis comparing benefits and costs. Show your ..

  Multitasking operating system

You are testing out a new multitasking operating system. In your testing, you find that some applications are not getting sufficient CPU time while others are getting more than necessary. Which component is likely to be the cause of this problem?

  Steps for company browse the site using this url

The static IP address of the server is 192.168.45.200. What steps do you take so that each computer in  company can browse site by using this URL?

  Specific types of security breaches

Keeping information systems secure is a major task, both for information security professionals and everyone who uses a network such as the Internet. Discuss 3 specific types of security breaches that could occur as you use the Internet.

  Introduction and features of session initiation protocol

Describe the complete introduction and features of Session Initiation Protocol in one to two pages along with proper references.

  Give an example each of following it relates saving account

If savings account is a class, give an example of each of the following as it relates to that savings account.

  What was the percentage of excess air used

what was the percentage of excess air used?

  Non-isomorphic graphs with the degree sequence

1.Show that if two graphs have the same degree sequence then they have the same number of vertices and the same number of edges. Find two non-isomorphic graphs with the degree sequence (2, 2, 2, 1, 1)

  Write a program that implements a scripting language

Write a program that implements a scripting language

  Write a recursive program spaces

Write a recursive program spaces(s) that takes as input a string s and returns the number of blank spaces (that is, ' ') the string s contains. You may not use string functions such as count, replace, etc. (slicing is ok), and loops and global variab..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd