Determine the bit value and bitstrings , Computer Engineering

Testing Your Program

All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the outputs should be. Run your program and make sure that your output matches the one you manually computed.

Question 1: On the first page of your assignment, write

  • your name,
  • your student number, and
  • the tutorial (T1, T2, or T3) in which you are registered.

Question 2: In this question, we consider finite bit strings that do not contain 00. Examples of such bitstrings are 0101010101 and 11110111.

For any integer n ≥ 2, let Bn be the number of bitstrings of length n that do not contain 00.

1.  Determine B2 and B3.

2.  Prove that Bn = Bn1 + Bn2 for each n ≥ 4.

3.  For each n ≥ 2, express Bn in terms of a Fibonacci number.

Question 3: Let S be the set of ordered triples of integers that are defined in the following way:

  • (20; 7; 449) 2 S.
  • If (a; b; c) 2 S then (a + 3; b + 4; 6a + 8b + c + 25) 2 S.

Prove the following:

For every element (a; b; c) in S, we have a2 + b2 = c.

Question 4: Recall that N = f0; 1; 2; 3; : : :g. The function f : N3 ! N is defined as follows:

1.  f(x; n; 0) = x + n for x _ 0 and n _ 0,

2.  f(x; 0; 1) = 0 for x _ 0,

3.  f(x; 0; 2) = 1 for x _ 0,

4.  f(x; 0; i) = x for i _ 3,

5.  f(x; n; i) = f(x; f(x; n = 1; i); i =1) for i _ 1 and n _ 1.

Determine f(2; 3; 2).

Posted Date: 3/9/2013 5:09:16 AM | Location : United States







Related Discussions:- Determine the bit value and bitstrings , Assignment Help, Ask Question on Determine the bit value and bitstrings , Get Answer, Expert's Help, Determine the bit value and bitstrings Discussions

Write discussion on Determine the bit value and bitstrings
Your posts are moderated
Related Questions
What are program invisible registers? Global and local descriptor tables are found in memory system. In order to specify and access the address of these tables, program invisi

Differentiate between program translation and program interpretation. The program translation model makes the execution gap through translating a program written in a program

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Storage Technology: In the previous section, the, recent innovations relating to the processing aspects of computer technology were discussed briefly. In considering some of t

What is write-through protocol? For a write operation using write-through protocol during write-hit: The cache location and the major memory location are updated concurrently.

Determine about the Web Based Tools HTML, XML, CGI and other open standards As is well known, the Web as well as Intranets speak and understand only one language i.e., th

What is automated information system Using this automated information system affords below benefits to the company and customers: -  System can be linked into websites to g

Sample Program In this program we only display: Line                             Offset Numbers                          -----------------Source Code-----------------

An array is referencing using a base array value as well as an index. To simplify addressing in arrays 8086 has provided two index registers for mathematical computations viz. BP a

What are Sewing Kits? Sewing Kits are modules which contain a not used mix of gates, any other cells or flip-flops considered potentially helpful for an unforeseen metal fix. W