## Determine the bit value and bitstrings , Computer Engineering

Assignment Help:

All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the outputs should be. Run your program and make sure that your output matches the one you manually computed.

Question 1: On the first page of your assignment, write

• the tutorial (T1, T2, or T3) in which you are registered.

Question 2: In this question, we consider finite bit strings that do not contain 00. Examples of such bitstrings are 0101010101 and 11110111.

For any integer n ≥ 2, let Bn be the number of bitstrings of length n that do not contain 00.

1.  Determine B2 and B3.

2.  Prove that Bn = Bn1 + Bn2 for each n ≥ 4.

3.  For each n ≥ 2, express Bn in terms of a Fibonacci number.

Question 3: Let S be the set of ordered triples of integers that are defined in the following way:

• (20; 7; 449) 2 S.
• If (a; b; c) 2 S then (a + 3; b + 4; 6a + 8b + c + 25) 2 S.

Prove the following:

For every element (a; b; c) in S, we have a2 + b2 = c.

Question 4: Recall that N = f0; 1; 2; 3; : : :g. The function f : N3 ! N is defined as follows:

1.  f(x; n; 0) = x + n for x _ 0 and n _ 0,

2.  f(x; 0; 1) = 0 for x _ 0,

3.  f(x; 0; 2) = 1 for x _ 0,

4.  f(x; 0; i) = x for i _ 3,

5.  f(x; n; i) = f(x; f(x; n = 1; i); i =1) for i _ 1 and n _ 1.

Determine f(2; 3; 2).

#### Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

#### Will case infer priority register if yes how give an example, Will case inf...

Will case infer priority register if yes how give an example? Yes case can infer priority register depending on coding style reg r; // Priority encoded mux, always @

#### How steps of instruction execution can be broken down, Q. How steps of inst...

Q. How steps of instruction execution can be broken down? Let's explain how these steps of instruction execution can be broken down to micro-operations. To make easier this dis

#### Combinational circuit for sorting the string, Every input line of combinati...

Every input line of combinational circuit represents a specific element of the string let's say xi and every output line results in the form of a sorted list. In order to get the a

#### What is a serial port, What is a serial port?  A serial port transfers...

What is a serial port?  A serial port transfers and receives data single bit at a time.

#### What is the difference between realloc() and free(), The free subroutine fr...

The free subroutine frees a block of memory lastly allocated by the malloc subroutine. Undefined results happen if the Pointer parameter is not a valid pointer. If the Pointer para

#### Explain about different types of mice, Q. Explain about different types of ...

Q. Explain about different types of Mice? Mice can be classified on the foundation of numbers of buttons, position sensing technology or type of Interface:  Sensing Technol

#### Define abap/4 layer, Define ABAP/4 layer? The ABAP/4 layer defines the ...

Define ABAP/4 layer? The ABAP/4 layer defines the data formats used by the ABAP/4 processor.

#### Define virtualisation and explain computer architecture, Rentrag has decide...

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers

#### What is serialization, What is serialization, how it works in .NET? Ser...

What is serialization, how it works in .NET? Serialization is when you persist the state of an object to a storage medium so an exact copy can be re-created at a later stage. S