Determine what the command or function sqrt

Assignment Help Computer Engineering
Reference no: EM131201128

Q1. You cannot the limits on the axes in MATLAB.

TRUE

FALSE

Q2. In C the printf function will print the entire contents of an array.

TRUE

FALSE

Q3. A for loop is required to print out the elements of a structure in C.

TRUE

FALSE

Q4. The subscript 0 corresponds to the first element of an array in MATLAB.

TRUE

FALSE

Q5. In C it is not possible to create an array of structure.

TRUE

FALSE

Q6. There can be no more than 20 members in a structure.

TRUE

FALSE

Q7. The member operator, ",", is used to access the members of a structure.

TRUE

FALSE

Q8. In MATLAB a user defined function can only return one value.

TRUE

FALSE

Q9. MATLAB is a great tool for creating data plots quickly.

TRUE

FALSE

Q10. A string is a one dimensional array characters.

TRUE

FALSE

Q11.  Arrays in C can have _______ dimensions.

A. no less than two

B. no more than 4

C. more than 100

D. none of the above  

Q12. Which command would find the MATLAB function that calculates the standard deviation of a vector:

A. doc standard deviation

B. clc

C. look for 'standard deviation'

D. help 'standard deviation'

Q13. Which is the best song ever:

A. Baby

B. Boyfriend

C. U Smile

D. Love me

E. One Time

F. Justine Bieber songs are like children.

G. You have to love them all equally

Q14. Typpedef struct circle

{

double radius;

double center_x;

double center_y;

} Circle;

Please write the statement needed to declare and initialize a structure of type Circle. The radius is 5, center x coordinate of 3.5, and center y coordinate of -5.2. Remember this requires only one line.

Q15. Write the MATLAB command needed to create a vector t that begins with -2 and progresses to 10 at increments of 0.25.

Now write a MATLAB statement to square each element in t and add five to the result.

Q16. Declare a structure for holding information about a car. It should hold the model name, year , and mileage.

Use typedef to give the structure a name that does not require struct when creating an instance of it.

Q17. a)  Write a C statement to declare an array buff with 200 characters:

b) Write a C statement to declare a two dimensional array wind. The array must be able to hold a 5 by 6 table of data.

c) Write a C statement to declare an astray of four doubles g initialized with the value 1.8, 4, 12.98, and -0.3;

Q18. The U.S. Geological Survey is doing a survey of the Red River of the North. They are flying a UAV over the river and using a radar to get depths of the river bed. This is basically like taking depth readings along a slice of the river. The flow rate of the river is proportional to the area of the slices. To be able to predict river levels they need to read in the data captured by the UAV and calculate the area of the slices. Then print out the corresponding areas. To get the area of a slice, multiply each river depth by the radar beams width, 100 ft, and sum the values. There are three readings per slice.

1730_Figure.png

Step 1: State the problem

Step 2: Input and outputs

Step 3: Work hand example

Step 4: Develop the algorithm

Q19. The MATLAB starting point for a function is:

function ( output_args ) = Untitled( input_args )

%UNTITLED Summary of this function goes here

%  Detailed explanation goes here

end

a) Please give the first line to a MATLAB function that has three inputs: a, h, and c. The function should return the sum and average of the corresponding numbers. The function's name should be "sum_ave_three.

b) Provide the body of the function that calculates each value being returned.

c) Call the created function to find the sum and average of 3, 7, and 2. Store the results in my_sum and my_ave.

Q20. Describe two of the three types of data files. Provide a pro and con of each.

Q21. Please convert the following to MATLAB statements. Assume t and x are vectors.

a) 5+6*31.85/35+711.5

b) g = 25/1.3*t3 - 2.9*t2+28

c) w = 1.54 * sin2(x * π) + 0.678 * sin (x * π) + 15.32

Q22. What MATLAB function should be used to determine what the command/function sqrt does?

Q23. What is the best learning activity you have done in a class at UND?

Attachment:- Algorithm Q18.rar

Reference no: EM131201128

Questions Cloud

Explain the difference between a genotype and a phenotype : Explain the difference between a genotype and a phenotype. What are the 3 different ways that trisomy 21 can be expressed? What are the differences and similarities between Klinefelter syndrome and Turner syndrome?
Problem regarding the deadweight loss : How does the elasticity of demand influence the incidence of a tax, the tax revenue, and the deadweight loss?
Problem regarding the deadweight loss : How does the elasticity of demand influence the incidence of a tax, the tax revenue, and the deadweight loss?
Problem regarding the deadweight loss : How does the elasticity of demand influence the incidence of a tax, the tax revenue, and the deadweight loss?
Determine what the command or function sqrt : What MATLAB function should be used to determine what the command/function sqrt does? A for loop is required to print out the elements of a structure in C
Find alice reservation wage : 1. Graph Alice's budget line. 2. Find Alice's reservation wage.
Devise a circuit for a simple burglar alarm : Devise a circuit for a simple burglar alarm that activates a siren if either a motion sensor detects motion or a sensor on a window detects that the window is open.
Barriers and biases might influence the ways : Identify in what way(s) one dimension that you've identified could create barriers and biases, and how those barriers and biases might influence the ways in which others might interact with you. Give specific examples, or share personal experience..
Prepare a thesis statement about changing our lives : Prepare a Thesis Statement about Changing Our Lives. A young innocent girl from a small neighborhood in Puerto Rico sitting at the dining table trying to work on her math homework.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the strengths and weaknesses

Explain the difference between managing users in the workgroup environment versus in a domain environment.

  Bourne shell and design suitable functions

Bourne shell and design suitable functions

  Impact on the quality of software available for used

Will commercial software manufacturers be justified in raising their prices to make up for revenue lost to open source competitors? Do you think that strategy will be effective.

  Complete the it system connection table

It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.

  Questionthink a scheduling problem where there are five

questionthink a scheduling problem where there are five activities to be scheduled in four time slots. assume we

  Define disaster-recovery processes

Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning.

  The second programming project comprises writing a program

the second programming project involves writing a program to calculate state income tax for a single taxpayer that uses

  From your knowledge and experience how are computer

from your knowledge and experience how are computer forensic investigators in todays world of complex technology are

  Write down an e-mail explaining the five elements of

imagine you have been hired by a small well-funded startup company to help with their it-enabled business strategy.

  Describing the hardware and software used to support

describing the hardware and software used to support personal workgroup and enterprise computing within your current

  Provider database-ms access-open office database

As you recall, data is a collection of facts (numbers, text, even audio and video files) that is processed into usable information. Much like a spreadsheet, a database is a collection of such facts that you can then slice and dice in various ways ..

  Web browser can be configured to protect against threat

Give some examples of how a web browser can be configured to protect against some of the threats listed in this weeks chapters. Make sure your examples are clear and what can be changed in the browser.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd