Demonstrating the commutative property

Assignment Help Basic Computer Science
Reference no: EM131470300

Please help with the attached question. The following are the comments left by the evaluate r

A1. The fifth roots of unity were properly identified in polar form and a Cayley table of products of these elements was provided as a means of demonstrating closure. In general this is an appropriate method, though an explanation for how the products in the table were determined could not be located. For instance, an explanation for why [cos(6pi/5) + i*sin(6pi/5)] * [cos(8pi/5) + i*sin(8pi/5)] = cos(4pi/5) + i*sin(4pi/5) could not be located.

A2. The Cayley table was referenced as demonstrating the commutative property. An explanation indicating how the table provides this information was not evident.

A3. The element '1' was correctly identified as the identity element of the set. A proof which verifies this claim could not be located, and the reference to the Cayley table was not sufficient.

A4. A statement identifying a general inverse property was made, as was the claim that "from the Cayley table see that every element has multiplicative inverse" which was accompanied by an example. This reference to the Cayley table and the example provided did not sufficiently demonstrate the property, as any details explaining how the table provided this information could not be located. Additionally, a substantiation for how the products in the table were determined is necessary before a proof referencing its entries can be considered for completeness.

A5. Many computations attempting to show the associative property using the elements cos(a) + i*sin(a), cos(b) + i*sin(b), and cos(c) + i*sin(c) were provided. Supporting statements for most lines of the proof could not be located. Additionally, it was not evident that the work specifically addressed the fifth roots of unity, as a, b, and c were defined to be any real numbers and in the work were referred to as integers.

Reference no: EM131470300

Questions Cloud

How many milliliters of water will the tank? hold : ?a) How many cubic centimeters of water will the tank? hold? b) How many milliliters of water will the tank? hold?
Analyse the buyer decision process : Assignment - Consumers as social beings - analyse the buyer decision process and critique effects of situational influences on consumer purchases
What gas was contaminating dimock pennsylvanias groundwater : What gas was contaminating Dimock, Pennsylvania's groundwater? According to the NY Times report how was waste water from drilling being disposed of?
Find the volume of the water in the pool : A swimming pool is 20 m long and 9 m? wide, and has an average depth of 2.5 m. Find the volume of the water in the pool in cubic meters and kiloliters.
Demonstrating the commutative property : The Cayley table was referenced as demonstrating the commutative property. An explanation indicating how the table provides this information was not evident.
Describe strategic planning techniques used to formulate : Analyze strategies for exerting the internal leadership needed to drive the implementation of strategic initiatives and improve operating excellence.
What factors contributed to the success of the attacks : What factors contributed to the success of the attacks? What challenges in responding would we face if a similar attack occurred in an American city?
What is legislative policy embodied in the arbitration act : Go to www.thomsonedu.com/ westbuslaw/ele, the Web site that accompanies this text. Select "Chapter" and click on "Case Briefing Assignments."
Local student user account and the password : Sarah calls the help desk because she has an intermittent problem logging on to her computer using the local Student user account and the password Pa$w0rd.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Do they give back to the community

Do they give back to the community? Do you feel employees are happy working there? What do you think the prospects are for future growth and profitability? Please elaborate on any / all of the above items or anything else you found to be interesti..

  Why is it important to educate users about risks

what is a primary security risk that users should acknowledge when using macros? Why is it important to educate users of these risks once their dilemma is resolved?

  When installing utp cable for a horizotnal link

When installing UTP cable for a horizotnal link, it is very important to minimize crosstalk. Explain what crosstalk is, why crosstalk can be a problem, and how it is minimized when terminating UTP cables.

  Do you get the quadratic b-spline scaling function

Apply the cascade algorithm to the dilation equation for the quadratic B-spline scaling function. Do you get the quadratic B-spline scaling function?

  Analysis covers testing benchmarks for each product

Analysis covers 3 competing products. Analysis covers product features of each product . Analysis covers pricing information for each product. Analysis covers testing benchmarks for each product. Analysis covers unique services offered by each produc..

  Create a set of png files that can be used as place marks

The png (), plot(), and draw circle () functions might be helpful. In addition, you might try making the symbols partially transparent so that when they overlap on the plot, they can still be seen.

  Create a database for managing our business

Evaluate the given statement and discuss some approaches to address the issue: "We spent several million dollars a few years ago to create a database for managing our business. In the past several months, we acquired a new business but its data does ..

  Can you create a unit test that distinguishes between them

Can you create a unit test that distinguishes between them? How would you refine the authors ' original description if you found out they used one of these methods?

  Describe how cryptography can be used to meet your goal

You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal.

  Role of the fcc in the telecommunications field

What is the role of the FCC in the Telecommunications field? What is the purpose for the creation of the governing statute for the regulation of telecommunications in the United States

  Propose a mechanism using ad hoc syntax-directed translation

Can you use an _-production to further simply your syntax-directed translation scheme?

  Find a sine function that its the data

The Average Daily Temperature Archive (University of Dayton 2012) has datasets for the average daily temperatures over a period of several years for a number of cities in the United States. For one city, find a sine function that its the data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd