functions, Basic Computer Science

Assignment Help:
each of the following functions has the form f(x ) = (ax+b) mod n. assume that each function has type N base n arrow N base n, so that we can think of f as a cipher for an alphabet represented by the numbers 0, 1, ......, n -1. Use (2.6) to determine whethereach function is a bijection, and , if so, construct its inverse. Then use (2.8) to determine whether the function has fixed points (i.e., letters that dont change), and , if so find them.
b. f(x) = 2x mod 6
d. f(x) = (3x+2) mod 6
f. f(x) = (5x+3) mod 12

Related Discussions:- functions

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

Sequential-access memory device, Sequential-access memory device: A  S...

Sequential-access memory device: A  Sequential-access  memory device reads data in sequence. In other words, information on a serial device can only be retrieved in the same s

Systems software, Systems Software: Systems software is generally supp...

Systems Software: Systems software is generally supplied by the hardware manufacturers. It includes operating systems, assemblers, compilers, and interpreters (to convert prog

Cost of computer, If you have to consider the installation of communication...

If you have to consider the installation of communications packages, the same questions have to be asked. (a) Does the software and the modem support the necessary transmission

Opening documents situated on different computers - network, Opening Docume...

Opening Documents Situated on Different Computers In order to work with documents situated on other computers, you need sufficient rights to access the folder in which it is

Cai, what is cai

what is cai

Browser cookies, Browser Cookies: A cookie is a small message sent by ...

Browser Cookies: A cookie is a small message sent by the Web server to a your web client. This message is stored by the browser as a text file. The basic purpose of cookie is

Microprocessor, how does microprocessor interpret with the burglar alarmn

how does microprocessor interpret with the burglar alarmn

What is Shortest-Remaining-Time (SRT) Scheduling?, • The SRT is the preemp...

• The SRT is the preemptive complement of SJF and helpful in time-sharing environment. • In SRT scheduling, the process with the least estimated run-time to completion is run next,

Create a flowchart that displays the student''s avera, Ask questiCreate a f...

Ask questiCreate a flowchart that displays the student''s average score for three quizzes. + Assume that there are 3 sections each having 5 students + The only valid number to be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd