1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
8

Write a function M-file that takes as input two matrices A and B, and as output produces

Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
4 0

Answer:

Explanation:

The Matlab Function rowproduct.m

function C = rowproduct( A,B) % The function rowproduct.m

M = size(A); % Getting the dimension of matrix A

N = size(B); % Getting the dimension of matrix B

if(M(2)~=N(1)) % Checking the dimension

fprintf('Error in matrix dimension\n'); % print error if dimension mismatch

return; % And end the further execution of function

end % End of if condition

C = []; % initilizing the result matrix C

for k = 1:M(1) % Loop to perform the row product

C = [C;A(k,:)*B];% Computing row product and updating matrix C

end % End of loop

end % End of function

Testing the function rowproduct.m

The 2x3, 3x2 Matrix:

>> A = [ 1 2 3; 1 2 3];

>> B = [1 2; 1 2; 1 2];

>> C = rowproduct(A,B)

C =

6 12

6 12

>> A*B

ans =

6 12

6 12

The 3x4, 4x2 matrix:

>> A = [ 1 2 3 4; 1 2 3 4; 1 2 3 4];

>> B = [1 2; 1 2; 1 2; 1 2];

>> C = rowproduct(A,B)

C =

10 20

10 20

10 20

>> A*B

ans =

10 20

10 20

10 20

The 3x4 and 2x4 matrix:

>> A = [ 1 2 3 4; 1 2 3 4; 1 2 3 4];

>> B = [1 2 1 2; 1 2 1 2];

>> rowproduct(A,B)

Error in matrix dimension

You might be interested in
Can someone be my friend,don't friend me until i ask you Questions
Semmy [17]

Answer:

Explanation:

actually you suck. nevermind.

3 0
2 years ago
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
Phantasy [73]

Answer:

The correct option is C. The user does not have a valid product license key. Both the OS installed on the bare metal (that the host) and the client OS must have a valid license key.

Explanation:

There is a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V.

This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well.

If you need to do testing as a software developer, or simply want an additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.

To have the Hyper-V feature on your PC, you'll need to meet some basic requirements like your computer will need 4GB of RAM with a 64-bit processor that has Second Level Address Translation (SLAT).

Many PCs on the market have this feature, while many PC BIOSes have virtualization features turned on by default, your PC might not.

As BIOS menu layouts are not universal, you'll want to consult your PC BIOS documentation as to where the feature is located in your firmware setup and what it is called.

a.   Windows 8.1 does not support Type 2 hypervisors.

 This option is wrong. All 64-bit Windows 8.1 OS except for the Home version supports hypervisors type 2 as well as type 1

b.   The motherboard does not support hardware-assisted virtualization.

Most of the PC that can run Windows 8.1 has visualization, all that is needed is to have it enabled if it was it enabled by default in the BIOS

c.   The user does not have a valid product license key.

This is the correct answer. For you to successfully install visualization software on Windows 8.1, both the host OS and the client OS must have a valid product key

d. The system is incompatible with Type 1 hypervisors.

This option is wrong. The Windows 8.1 OS does not only support the installation of visualization software, it came with its hypervisor called Hyper-V.

7 0
2 years ago
1. Engineers should not consult with experts if they do not know much about a problem.
Ganezh [65]
1. false
2. d
3. b
4. a
5. b
6.c
7. b
8.a
9. d
10. b
11. d
12.a 
13. c
14. c
15. a
5 0
3 years ago
Which name is given to an architectural framework for delivering ip multimedia services?
jonny [76]
IP Multimedia Subsystem<span> or </span>IP Multimedia<span> Core Network </span>Subsystem<span> (</span>IMS) is the term that refers and describes<span> an architectural framework for delivering IP multimedia services.
</span>IMS is a standards-based architectural framework <span> defined by the 3rd Generation Partnership Project (3GPP) </span>for delivering multimedia<span> communications </span>services such as voice, video and text .
6 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    9·1 answer
  • Once your hard drive is installed what needs to be done to the drive and what do these two tasks do
    12·1 answer
  • What does the rule of five say?
    12·2 answers
  • Match each vocabulary word to its definition.
    11·2 answers
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • HELP MEEE PLEASE!!!
    11·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • What are basic types of touch screen
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!