How many ways can a selection of 6 coloured balls be made

Assignment Help Computer Network Security
Reference no: EM13923106

1. Use Mathematical Induction to prove the following:

(i) n3 - n is divisible by 3, for all integers n ≥ 1;

(ii) 1 + 3 + 5 + ? + (2n - 1) = n2 for all integers n ≥ 1.

2. How many positive integers between 100 and 699 inclusive

(i) have the same first and third digits?

(ii) are divisible by 4?

(iii) are divisible by 6? 

(iv) are divisible by both 4 and 6?

(v) are divisible by either 4 or 6?

(vi) are divisible by 6 but not by 4?

3. Given that A = {1, 2, 3, 4} and B = {5, 6, 7, 8, 9}, how many functions f: A → B are there
(i) in total?

(ii) which are one-to-one?

(iii) with f(1) = 5, f(2) = 6 and f(3) = 7?

(iv) with f(1) ≠ 5, and f(3) ≠ 7 ?

4. (i) At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need?

(ii) How many people must you have to ensure that at least 12 of them have the same birthday (assume 366 possible birthdays)?

5. A ship's crew is to be selected from 25 people. There are 5 captains, 7 leading hands, 5 midshipmen and 8 ordinary sailors available. If the crew is to consist of 1 captain, 2 leading hands, 3 midshipmen and 4 ordinary sailors, in how many different ways can the crew be formed?

6. Find the coefficient of x27y2 in the expansion of (-x - 3y)29.

7. In how many different ways can a selection of 6 coloured balls be made from a barrel containing red, green, yellow and blue balls and the selection must contain at least 2 blue balls?

8. Using all the letters, find the number of different strings that can be formed from the word: ARKAROOLA

9. For each of the following relations R on the set A = {2, 4, 6, 8, 10}, determine (give reasons) whether R is:

(a) reflexive; (b) symmetric; (c) transitive (i) R = {(2,2), (2,4), (4,2), (4,6), (2,6), (6,4), (6,2)}

(ii) R = {(2,2), (4,4), (6,6), (8,8), (10,10), (2,4), (4,6), (2,6)}

(iii) R = {(2,10), (10,2), (4,8), (8,4), (6,6)}

Reference no: EM13923106

Questions Cloud

How the accounting equation relates to the components : Provide examples that show how the components of the accounting equation affect each other and how transactions affect the accounting equation.
Initial cash outlay necessary to replace existing equipment : A company is evaluating the possible replacement of equipment. New equipment would cost $92,325, and sales tax on the purchase would be 6%. Both the purchase price and sales tax would be capitalized. What is the initial cash outlay necessary to repla..
Components of ethics legality and fairness : With your analysis complete, prepare a brief summary in which you relate the components of ethics, legality, and fairness in decision making
What is the break-even price for the new phone : Conch Republic Electronics is a midsized electronics manufacturer located in Key West, Florida. The company president is Shelley Couts, who inherited the company. When it was founded over 70 years ago, the company originally repaired radios and other..
How many ways can a selection of 6 coloured balls be made : At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different ways can a selection of 6 coloured balls be made from a barrel containing red..
Identify and describe the historical event : Identify and describe the historical event. Analyze the historical and contemporary causes of the event. Analyze different historical interpretations of this event. Evaluate the later consequences of this event. The final paper should be 8-10 page..
Data to make informed decisions : A firm's financial statements can tell you a lot about them, but exactly what does that mean and how can financial managers use this data to make informed decisions? Which statements do you feel reveal the most useful information and why?
Firm purchased equipment three years : A firm purchased equipment three years ago for $22,047. Accumulated depreciation is $10,558, and the firm's tax rate is 29%. If the equipment is sold today for $17,406, how much net cash flow would be generated? Round your answer to the nearest whole..
Familiar with in process from start to finish : Choose an item that you would like to manufacture. You do not actually need to manufacture something, but will proceed through the assignment as if you were planning on manufacturing the item you have selected.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Discuss the difference between hmac and mac

The Message Authentication Code (MAC) is a widely used technique for performing message authentication, and one MAC algorithm has emerged as the Internet standard for a wide variety of applications: Hash-Based Message Authentication Code (HMAC)

  Outline security threats and vulnerabilities

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The topc and title is security threats and vulnerabilities

  Security logic to specific forms in the web application

You will add additional security features to make the web application more secure. You will also add security logic to specific forms in the web application.

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Differences between terms security class and security level

Explain the differences between the terms security class, security level, security clearance, and security classification and What are two rules that a reference monitor enforces?

  Examine network security of kundler networks

The next person will have to examine network security of Kundler networks to include routers and firewalls

  Is the research informed by primary sources of theories

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Explain how you would integrate security requirements

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd