Reference no: EM131400921
Homework - Functions and Control Flows
Last year, a mammoth's femur was found under Reser Stadium, and it is said that Manny's femur is at least 10,000 years old. However, to determine the age of the femur, scientist would want to perform a radiocarbon (14C) dating analysis. The governing equation for such analysis is:
N(t) = N0e-λt
where N0(t = 0) is the initial number of radiocarbon atoms, N is the number of atoms present today, λ is the decay constant of radiocarbon, and t is time. It is also known that the relationship between the number of atoms and activity is:
A = λN
λ = Ln2/t1/2
For this assignment you are asked to create a function with the following properties:
Input Variables
|
Output Variables
|
N0
|
N
|
lambda
|
t1/2
|
Isotope name
|
|
Options, with following options:
|
Plots
|
The function you create should work whether I provided 2 or 4 different input variables and the default output variable is N, i.e., if I only give one output variable it should return the number of atoms present today. Nonetheless, if two are provided, the function should return N; t1/2; Activity if I call for the other variables. If I provide 4 input variables, then it should return the decay plot up to today of any of the string options, i.e., if 'Activity' plot activity. After completing the function:
1. If the initial number of (14C) atoms is 1020, how many atoms are there today? What is the activity that should be found in the sample if it has decay for 10,000 years? What is the half-life of (14C)?
2. Create a vector with Options variable, i.e., Activity, NumAtoms, Both, and create a for loop that calls for your function such that it returns each of the following plots:
- Plot of number of atoms over 10,000 years
- Plot of activity over 10,000 years
- Plot of both the activity and number of atoms over 10,000 years
Stuxnet and the new cyber weapons
: Cyber activities can be transnational, and the changing environment is blurring the traditional distinctions between crime, espionage, terrorism and warfare.
|
Instructions to add two unsigned numbers
: Write instructions to add two unsigned numbers 3FH and 47H and save the result in data register REG3 (ADRESS 03H). Identify the status of Z and C flags.
|
Difference between a op-amp buffer and a normal wire
: Signal processing: What is the difference between a op-amp buffer and a normal wire? Can we treat them like they can replace each other?
|
Data modeling between a data mart and a data warehouse
: Discuss the key differences in data modeling between a data mart and a data warehouse. Why would your organization choose to use a data mart versus a data warehouse? What benefits would it gain from its choice, and what limitations would it encou..
|
Create a vector with options variable
: NSE 115 Homework - Functions and Control Flows. Create a vector with Options variable, i.e., Activity, NumAtoms, Both, and create a for loop that calls for your function such that it returns each of the following plots: Plot of number of atoms over..
|
What is the duty cycle of the transistor
: A basic switching regulator is shown in Figure 17-49. If the switching frequency of the transistor is 10 kHz with an off-time of 60 s, what is the output voltage?
|
Critical operations a technician can master
: Managing files and folders may seem like mundane work, but file storage and management is one of the most critical operations a technician can master.
|
Explain the details about procedure for the known hydrate
: Explain the details about the procedure for the known hydrate (Part 1) and designing the procedure used for the unknown hydrate (Part 2). Be concise and descriptive.
|
Proliferation of mobile devices on cloud-based computing
: Analyze and explain the impact of the proliferation of mobile devices on cloud-based computing in various industries. For example, the rise of mobile phones and cloud-based computing has impacted the high-tech industries and education through a sh..
|