Determine the bit value and bitstrings , Computer Engineering

Assignment Help:

Testing Your Program

All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the outputs should be. Run your program and make sure that your output matches the one you manually computed.

Question 1: On the first page of your assignment, write

  • your name,
  • your student number, and
  • the tutorial (T1, T2, or T3) in which you are registered.

Question 2: In this question, we consider finite bit strings that do not contain 00. Examples of such bitstrings are 0101010101 and 11110111.

For any integer n ≥ 2, let Bn be the number of bitstrings of length n that do not contain 00.

1.  Determine B2 and B3.

2.  Prove that Bn = Bn1 + Bn2 for each n ≥ 4.

3.  For each n ≥ 2, express Bn in terms of a Fibonacci number.

Question 3: Let S be the set of ordered triples of integers that are defined in the following way:

  • (20; 7; 449) 2 S.
  • If (a; b; c) 2 S then (a + 3; b + 4; 6a + 8b + c + 25) 2 S.

Prove the following:

For every element (a; b; c) in S, we have a2 + b2 = c.

Question 4: Recall that N = f0; 1; 2; 3; : : :g. The function f : N3 ! N is defined as follows:

1.  f(x; n; 0) = x + n for x _ 0 and n _ 0,

2.  f(x; 0; 1) = 0 for x _ 0,

3.  f(x; 0; 2) = 1 for x _ 0,

4.  f(x; 0; i) = x for i _ 3,

5.  f(x; n; i) = f(x; f(x; n = 1; i); i =1) for i _ 1 and n _ 1.

Determine f(2; 3; 2).


Related Discussions:- Determine the bit value and bitstrings

Define the meaning of business-to-business, Define the meaning of business-...

Define the meaning of business-to-business. B2B (business-to-business): The consensus is universal: it is the priority; it is where the money is. It’s rather true; theref

Software engineering, how many errors will be left after defect amplificat...

how many errors will be left after defect amplification and removal method on the following data design=40 analysis=30 maintenance=20 testing 35 coding 25 take 75% removal efficie

What is pipelining, What is pipelining? The overlapping of implementati...

What is pipelining? The overlapping of implementation of successive instructions is known as pipelining.

Loop level-levels of parallel processing, Loop Level At this level, rep...

Loop Level At this level, repeated loop iterations are the applicants for parallel execution. However, data dependencies among subsequent iterations may limit parallel executio

What are different control function categories, What are different control ...

What are different control function categories. Explain. In several switching systems, the control subsystem may be an integral part of the switching network itself. This syst

What is monitoring-and-surveillance agents, Q. What is monitoring-and-surve...

Q. What is monitoring-and-surveillance agents? ANSWER: Monitoring-and-surveillance agents or predictive agents are intelligent agents that examine and report on equipment.

With respect to security which is the better .net or j2ee, With respect to...

With respect to security, which one is the better choice?.Net or J2EE? Explain? As per majority programmers .NET is the best one which have one vendor compare to, the ease of

Utilization count - processor, The Utilization Count shows the status of ea...

The Utilization Count shows the status of each processor in a specific mode i.e.  Overhead mode, busy mode, and idle mode with respect to the progress in time as shown in Figure.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd