Determine the bit value and bitstrings , Computer Engineering

Assignment Help:

Testing Your Program

All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the outputs should be. Run your program and make sure that your output matches the one you manually computed.

Question 1: On the first page of your assignment, write

  • your name,
  • your student number, and
  • the tutorial (T1, T2, or T3) in which you are registered.

Question 2: In this question, we consider finite bit strings that do not contain 00. Examples of such bitstrings are 0101010101 and 11110111.

For any integer n ≥ 2, let Bn be the number of bitstrings of length n that do not contain 00.

1.  Determine B2 and B3.

2.  Prove that Bn = Bn1 + Bn2 for each n ≥ 4.

3.  For each n ≥ 2, express Bn in terms of a Fibonacci number.

Question 3: Let S be the set of ordered triples of integers that are defined in the following way:

  • (20; 7; 449) 2 S.
  • If (a; b; c) 2 S then (a + 3; b + 4; 6a + 8b + c + 25) 2 S.

Prove the following:

For every element (a; b; c) in S, we have a2 + b2 = c.

Question 4: Recall that N = f0; 1; 2; 3; : : :g. The function f : N3 ! N is defined as follows:

1.  f(x; n; 0) = x + n for x _ 0 and n _ 0,

2.  f(x; 0; 1) = 0 for x _ 0,

3.  f(x; 0; 2) = 1 for x _ 0,

4.  f(x; 0; i) = x for i _ 3,

5.  f(x; n; i) = f(x; f(x; n = 1; i); i =1) for i _ 1 and n _ 1.

Determine f(2; 3; 2).


Related Discussions:- Determine the bit value and bitstrings

How do you traverse a btree in backward in-order, Put the node in the right...

Put the node in the right subtree Then, Put the root  Put the node in the left subtree

Recursion, Ask qurecurrion for short noteestion

Ask qurecurrion for short noteestion

Differentiate between worms and boot-sector viruses, Question: (a) Pro...

Question: (a) Program instructions and data are brought into memory first, in order to be executed. Explain how the CPU enables an instruction to be executed? (b) Describe

Applications of electronic data interchange in business, What are the appli...

What are the applications of Electronic Data Interchange in business? The applications of Electronic Data Interchange are as given below: 1. Organisations that use EDI 2

Inverse of exclusive or known as xnor gate, Truth table of NAND and NOR can...

Truth table of NAND and NOR can be made from NOT (A AND B) and NOT (A OR B) correspondingly. Exclusive OR (XOR) is a special gate whose output is one only if two inputs aren't equa

Write the truth table of NOR gate, Write the truth table of NOR gate. Ans...

Write the truth table of NOR gate. Ans. The truth table for NOR gtae is shown below:

How a direct inward dialling is utilized, Direct inward dialling is used as...

Direct inward dialling is used as a feature in? Direct inward dialling is utilized as a feature in EPABX.

Direct isp service through leased line, The most expensive method of access...

The most expensive method of accessing Internet is to use leased lines which connect directly to the ISP. This will increase access rate to anywhere between 64 K and 1.5 Mbps, rely

How many two-input AND and OR gates are required to realize , How many two-...

How many two-input AND and OR gates are required to realize Y=CD+EF+G ? Ans. Y=CD+EF+G No. of two i/p AND gates=2 No. of two i/p OR gates = 2 One OR gate to OR CD and EF

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd