Does the diagram above represent a function f: x ? y

Assignment Help Basic Computer Science
Reference no: EM13230128

Answer the following questions for the arrow diagram below:

1. Does the diagram above represent a function f: X → Y? Explain why or why not

2. If so, is the function one-to-one? Explain why or why not

3. If so, is the function onto? Explain why or why not

4. If this is a function, does it have an inverse? Explain why or why not

Answer the following questions for the set of ordered pairs below:
{ (a,1), (b,2), (b,3), (c,4) }
5. Does the set of ordered pairs above represent a function f: X → Y? Explain why or why not

6. Give a formal proof that the Successor Function, f(k) = k + 1 for all integers k, is a one-to-one correspondence.:
Answer the following questions for the arrow diagram below:

7. Does the diagram above represent a function f: X → Y? Explain why or why not

8. If so, what is the Domain?

9. If so, what is the Co-Domain?

10. If so, what is the Range?

11. If so, what is the value of f(2)?

12. If so, what is the Inverse Image of d?

13. If so, is the function one-to-one? Explain why or why not

14. If so, is the function onto? Explain why or why not

15. Represent the arrow diagram as a set of ordered pairs

Answer the following questions for the ordered pairs below:
{ (a,1), (b,2), (c,1), (d,3) }
16. Do the ordered pairs above represent a function f: X → Y? Explain why or why not

17. If so, is the function one-to-one? Explain why or why not
For the following problems, calculate the log AND justify why your calculation is correct by using the definition of log as in the online Course Content:
18. Log5(125) =

19. Log2(256) = 

20. Log10(1/100,000) =

21. Using the Division Remainder Method, give a concrete example of a hash function for a storage array with 10 storage locations addressed 0 through 9. Call your hash function h, define your function mathematically as h(x) = x mod 10, then use it to show how records with key fields of 36, 39, 25, 45, 27, 35, and 53 (in that order) would be placed into storage using the diagram below. Don't worry about the Packing Factor or using a prime divisor. Use Linear Probing to handle any collisions:
Address Contents
0
1
2
3
4
5
6
7
8
9
22. Prove that F: R → R where F(x) = 4x - 7 is one-to-one

23. Prove that F: R → R (R is the set of all Real Numbers) where F(x) = 2x+3 is onto

24. a) Discuss the role of inverse functions in simple cipher encryption, and b) indicate whether simple ciphers are strong enough for modern commercial encryption needs

25. Draw an Arrow Diagram for the function shown in the following Input/Output Table (you may use Word's drawing tools or copy and paste from your favorite drawing tool or draw by hand and scan into your Quiz document):
INPUT OUTPUT
P Q S
1 1 0
1 0 1
0 1 1
0 0 0

Reference no: EM13230128

Questions Cloud

Internet bubble history research paper : Mini Research Paper: Internet Bubble History Research Paper
What is the percent quantization error : A unipolar 16 bit ADC measures 0 - 10 volts full scale.  What is the minimum resolvable voltage What is the percent quantization error What is the percent quantization error if a 1 volt max signal is input
Definite versus indefinite loops : Definite versus Indefinite Loops
Calculate count that should appear in timer capture register : Calculate the count that should appear in the timer capture register TC0 if a 125 kHz rectangular wave is inputted on timer pin PT0 while TCTL4 is preset for falling edge detection. Assume a 24 MHz e-clock, TMSK2 was programmed
Does the diagram above represent a function f: x ? y : Does the diagram above represent a function f: X → Y? Explain why or why not
How does the law regarding union recognition for public : How does the law regarding union recognition for public employees in thestate of Florida compare with the NLRA rules regarding union recognition for private-sector employees?
What kinds of gatekeepers in the organization : What kinds of "gatekeepers" in the organization might be especially helpful to you in your position as a department supervisor?
What are the steps for process improvement : What are the steps for process improvement? And examples of companies that have used this.
Compute the multifactor productivity under each system : Use carts per worker per hour as the measure of labor productivity. (Round your answers to 2 decimal places.) b. Compute the multifactor productivity under each system. Use carts per dollar cost (labor plus equipment) as the measure. (Round your a..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prepare a project task list to include all the detailed task

You are the data transformation specialist for the first data warehouse project in an airlines company. Prepare a project task list to include all the detailed tasks needed for data extraction and transformation.

  What does the memory model of a microcontroller show

What does the memory model of a microcontroller show? Discuss the reasons for different types of memory such as RAM, EEPROM, and FLASH used in HCS12.

  Show even-parity encoding of bit string in form of bytes

Show the even-parity encoding of the following bit string, in the form of bytes: 0100101011101011101010110110 (break it up into pieces of data large enough to encode as several parity-encoded bytes.

  Class that tests all the methods in the class

Write a test program for each class that tests all the methods in the class.

  Write a program that prompts the user

Java: Write a program that prompts the user to enter the number of students and each student's name and score, than display the name of the student with the highest score.

  Describing dichotomy is not linearly separable

Let the d component of x be either 0 or 1. Assume we assign x to w1 if number of non-zero components of x is odd, and to w2 otherwise. Illustrate that this dichotomy is not linearly separable if d>1.

  Write an expression that divides distance

Given two integer variables distance and speed , write an expression that divides distance by speed using floating point arithmetic, i.e. a fractional result should be produced.

  Explain can capabilities protect against all trojan horses

Can capabilities protect against all Trojan horses? Either show that they can or describe a Trojan horse process that C-Lists cannot protect against.

  An instruction set which includes transcendental function

Describe a major application which would need each of the following types of instruction set

  What continuing education is required for the holder

what continuing education is required for the holder of a CISSP to remain current and in good standing.

  Key principles on smart phone devices gps tracking system

How to apply these key principles on smart phone devices GPS tracking system/software to mitigate user personal information be exposed undesirably.

  Write relational algebra expression itinerary detailed dates

Write down the relational algebra expressions for given transactions. When viewing appointments have been made, itinerary has to be given detailing dates.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd