How many ways can a selection of 6 coloured balls be made

Assignment Help Computer Network Security
Reference no: EM13923106

1. Use Mathematical Induction to prove the following:

(i) n3 - n is divisible by 3, for all integers n ≥ 1;

(ii) 1 + 3 + 5 + ? + (2n - 1) = n2 for all integers n ≥ 1.

2. How many positive integers between 100 and 699 inclusive

(i) have the same first and third digits?

(ii) are divisible by 4?

(iii) are divisible by 6? 

(iv) are divisible by both 4 and 6?

(v) are divisible by either 4 or 6?

(vi) are divisible by 6 but not by 4?

3. Given that A = {1, 2, 3, 4} and B = {5, 6, 7, 8, 9}, how many functions f: A → B are there
(i) in total?

(ii) which are one-to-one?

(iii) with f(1) = 5, f(2) = 6 and f(3) = 7?

(iv) with f(1) ≠ 5, and f(3) ≠ 7 ?

4. (i) At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need?

(ii) How many people must you have to ensure that at least 12 of them have the same birthday (assume 366 possible birthdays)?

5. A ship's crew is to be selected from 25 people. There are 5 captains, 7 leading hands, 5 midshipmen and 8 ordinary sailors available. If the crew is to consist of 1 captain, 2 leading hands, 3 midshipmen and 4 ordinary sailors, in how many different ways can the crew be formed?

6. Find the coefficient of x27y2 in the expansion of (-x - 3y)29.

7. In how many different ways can a selection of 6 coloured balls be made from a barrel containing red, green, yellow and blue balls and the selection must contain at least 2 blue balls?

8. Using all the letters, find the number of different strings that can be formed from the word: ARKAROOLA

9. For each of the following relations R on the set A = {2, 4, 6, 8, 10}, determine (give reasons) whether R is:

(a) reflexive; (b) symmetric; (c) transitive (i) R = {(2,2), (2,4), (4,2), (4,6), (2,6), (6,4), (6,2)}

(ii) R = {(2,2), (4,4), (6,6), (8,8), (10,10), (2,4), (4,6), (2,6)}

(iii) R = {(2,10), (10,2), (4,8), (8,4), (6,6)}

Reference no: EM13923106

Questions Cloud

How the accounting equation relates to the components : Provide examples that show how the components of the accounting equation affect each other and how transactions affect the accounting equation.
Initial cash outlay necessary to replace existing equipment : A company is evaluating the possible replacement of equipment. New equipment would cost $92,325, and sales tax on the purchase would be 6%. Both the purchase price and sales tax would be capitalized. What is the initial cash outlay necessary to repla..
Components of ethics legality and fairness : With your analysis complete, prepare a brief summary in which you relate the components of ethics, legality, and fairness in decision making
What is the break-even price for the new phone : Conch Republic Electronics is a midsized electronics manufacturer located in Key West, Florida. The company president is Shelley Couts, who inherited the company. When it was founded over 70 years ago, the company originally repaired radios and other..
How many ways can a selection of 6 coloured balls be made : At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different ways can a selection of 6 coloured balls be made from a barrel containing red..
Identify and describe the historical event : Identify and describe the historical event. Analyze the historical and contemporary causes of the event. Analyze different historical interpretations of this event. Evaluate the later consequences of this event. The final paper should be 8-10 page..
Data to make informed decisions : A firm's financial statements can tell you a lot about them, but exactly what does that mean and how can financial managers use this data to make informed decisions? Which statements do you feel reveal the most useful information and why?
Firm purchased equipment three years : A firm purchased equipment three years ago for $22,047. Accumulated depreciation is $10,558, and the firm's tax rate is 29%. If the equipment is sold today for $17,406, how much net cash flow would be generated? Round your answer to the nearest whole..
Familiar with in process from start to finish : Choose an item that you would like to manufacture. You do not actually need to manufacture something, but will proceed through the assignment as if you were planning on manufacturing the item you have selected.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd