Find the height level of the tree

Assignment Help Basic Computer Science
Reference no: EM13847300

Assignment 1:

1. The figure below shows a rooted tree,

756_Find the height.png

1.1. Find the height/level of the tree as shown above?
1.2 How many leaves does the tree have?

2. Mike sells on the average 15 newspapers per week (Monday - Friday). Find the probability that
2.1 In a given week he will sell all the newspapers
2.2 In a given day he will sell five newspapers.
3. Suppose that of 100 computers checked for viruses 30 where infected and 70 where not. If we select 10 computers at random what is the probability that at most 4 of them are infected?

Assignment 2:

1. You become a manager of Pick n Pay store and you are told that customers arrive at the store at an average of 30 per hour. What is the probability that you must wait at least 3 minutes for the first customer?

2. David bought a new phone. After the first 5 hours of use, the average remaining lifetime of the battery is 7 hours. Find the probability that the battery will last between 11 and 15 hours.

3. From the digraph below ,answer each of the following questions

442_Find the height1.png

3.1 Label and find the number of edges, degrees and vertex in the above digraph.
3.2 Find the corresponding matrix of the digraph above.
3.3 Are there any sources or sinks, justify your answer?

Reference no: EM13847300

Questions Cloud

Identify a brand about which you are passionate : Identify a brand about which you are passionate.
How many days will they both be on the menu again : The school cafeteria serves pizza every sixth day and applesauce every eighth day if pizza and applesauce are both on the menu today in how many days will they both be on the menu again
Explain how an oligotrophic lake can become eutrophic? : Explain how an oligotrophic lake can become eutrophic?
Assignment for paula hog : Assignment for paula Hog
Find the height level of the tree : Find the height - level of the tree and how many leaves does the tree have - Find the probability that the battery will last between 11 and 15 hours.
Find and print the datamonitor swot analysis for the firm : Your next assignment is to find and print the Datamonitor SWOT Analysis for the firm that you picked (or I assigned) on the sheet that I just posted in Blackboard; "Student Product List".
Cultural and personality differences can impact cooperation : Cultural differences and personality differences can impact cooperation
Healthcare strategic management plan : Healthcare Strategic Management Plan, To achieve a successful project experience and outcome, you are expected to synthesize your project components into a strategic framework that links planning to service operations
The importance of understanding your learners needs : The title of the training will be "The Importance of Understanding Your Learners' Needs". If your proposal is chosen as the training module for the company, you will be granted a substantial bonus and a raise. Woohoo! But you have to get the jo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A disadvantage of the content of approach for lans

A disadvantage of the content of approach for LANs, such as CSMA/CD, is the capacity wasted due to multiple stations attempting to access the channel at the same time. Suppose that time is divided into discrete slots, with each of N stations attempti..

  Customer driven analytics to make managerial decisions

Demonstrate your understanding and knowledge gained about session's material. Complete with a short discussion (one paragraph) for each question on a Word document and upload through the courseware.

  The two octets following the address fields

NICs can tell whether an arriving frame is tagged or not simply by looking at it. How can they do so? (Hint: They look at the value in the two octets following the address fields.)

  Assume that you are serving in the role of director of data

imagine that you are serving in the role of director of data center operations for your company which is currently

  Address-based authentication works

Explain how address-based authentication works. Is this a secure authentication technique? Why or why not?

  What is technology s-curve

What is technology S-curve? Give an example that explains how to use S-curves to prescribe development of new component technologies.

  Calculate delay in network and data loss

For a 1-Gbps network operating over 5000 km, the delay is the limiting factor, not the bandwidth. Consider a MAN with the average source and destination 20 km apart.

  Risk assessment tools

Risk assessment tools.

  Explaining process of making changes as recursive

You can view the process of making changes as recursive. You first see if any dollars are required, subtract them from the total, and then make change for what remains. Complete the LISP program to achieve the above requirements.

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

  How the data block information is managed using fat

File X has 15 data blocks. The block addresses of the 15 blocks are 8, 9, 10, 11, 12, 13, 5, 4, 21, 22, 23, 24, 25, 26 and 27.

  Write an isr in c to add the signed value on port t (ptt)

Write an ISR, in C, to add the signed value on PORT T (PTT) to the byte value stored in location data1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd