1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
3 years ago
13

Consider the following arrays. 1 4 21 2 4 100 B # 111(A) L3π 42 Write MATLAB expressions to do the tollowing a. Select just the

second row of B. b. Evaluate the sum of the second row of B. c. Multiply the second column of B and the first column of A element by element. d. Evaluate the maximum value in the vector resulting from element-by- element multiplication of the second column of B with the first column of A. e. Use element-by-element division to divide the first row of A by the first three elements of the third column of B. Evaluate the sum of the elements of the resulting vector
Computers and Technology
1 answer:
andriy [413]3 years ago
6 0

Answer:

Complete Matalb code along with explanation and output results are given below

Explanation:

We are given following two matrices A and B of size 4x3

A = [1 4 2; 2 4 100; 7 9 7; 3 pi 42]

B = log(A)

(a) Select just the second row of B

% to extract any row use this syntax  B(row no, : )  we can also extract more than 1 row or any particular elements in a specific row

B_row_2 = B(2,:)

(b) Evaluate the sum of the second row of B

% simply use the sum function and pass it any vector or matrix and it will return their sum

sum_B_row_2 = sum( B_row_2(:) )  

(c) Multiply the second column of B and the first column of A element by element

% first we extract the column 2 of matrix B and column 1 of matrix A. use this syntax  B( : ,col no ) to extract any column  

B_col_2 = B(:,2)

A_col_1 = A(:,1)

% Then we use ( .*) to multiply element by element. To use standard multiplication of matrices only use asterisk sign without coma

multiply=B_col_2.*A_col_1

(d) Evaluate the maximum value in the vector resulting from element-by- element multiplication of the second column of B with the first column of A

% we can find the maximum value in a vector or matrix by using max function so we pass the multiply variable where our result was stored

max_value = max(multiply)

(e) Use element-by-element division to divide the first row of A by the first three elements of the third column of B. Evaluate the sum of the elements of the resulting vector

%  First we extract the row 1 of matrix A

A_row_1 = A(1,:)

%  Then we extract the column 3 of matrix B

B_col_3 = B(:,3)

%  Then we extract the first 3 elements of column 3 of matrix B

B_col_3 = B_col_3(1:3)

% Finally we use ( ./ ) to use element by element division

divide = A_row_1./B_col_3

% Using the sum function again results in the addition of entire elements of resultant matrix

sum_divide = sum( divide(:) )

Only Code:

A = [1 4 2; 2 4 100; 7 9 7; 3 pi 42]

B = log(A)

B_row_2 = B(2,:)

sum_B_row_2 = sum( B_row_2(:) )  

B_col_2 = B(:,2)

A_col_1 = A(:,1)

multiply=B_col_2.*A_col_1

max_value = max(multiply)

A_row_1 = A(1,:)

B_col_3 = B(:,3)

B_col_3 = B_col_3(1:3)

divide = A_row_1./B_col_3

sum_divide = sum( divide(:) )

Output Results:

A =

    1.0000     4.0000     2.0000

    2.0000     4.0000   100.0000

    7.0000     9.0000     7.0000

    3.0000     3.1416    42.0000

B =  

  0.00000   1.38629   0.69315

  0.69315   1.38629   4.60517

  1.94591   2.19722   1.94591

  1.09861   1.14473   3.73767

B_row_2 =   0.69315   1.38629   4.60517

sum_B_row_2 =  6.6846

B_col_2 =  

  1.3863

  1.3863

  2.1972

  1.1447

A_col_1 =

  1

  2

  7

  3

multiply =

   1.3863

   2.7726

  15.3806

   3.4342

max_value =  15.381

A_row_1 =     1   4   2

B_col_3 =  

  0.69315

  4.60517

  1.94591

  3.73767

B_col_3 =

  0.69315

  4.60517

  1.94591

divide =

  1.44270   5.77078   2.88539

  0.21715   0.86859   0.43429

  0.51390   2.05559   1.02780

sum_divide =  15.216

You might be interested in
Funny or fascinating web content is said to go _________ when it is shared and re-shared a large number of times over a short pe
beks73 [17]
It is said to go viral?
4 0
3 years ago
Write an algorithm in pseudo code to find the product of two numbers​
Vadim26 [7]

Answer:

Read num1 , num2

Set multi to num1*num2

Write multi

Explanation:

7 0
4 years ago
What is one reason to create a study check list​
grigory [225]
To make sure you studied everything you need to know.
4 0
3 years ago
How do you get The special and extended ending in final fight 2 snes
andreev551 [17]
Yes what that person above said!
4 0
3 years ago
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
Other questions:
  • Windows enables each user to establish a ____, which identifies to windows the resources, such as apps and storage locations, a
    6·1 answer
  • Which type of ICS facility is used to temporarily position and account for personnel, supplies, and equipment awaiting assignmen
    15·1 answer
  • How do I change the selected cell to 20 pt
    8·2 answers
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • Ms. Osteen gives her class an assignment to insert background color that gradually changes from blue to green. To accomplish thi
    8·1 answer
  • How do we add questions on sam Blockly?​
    6·1 answer
  • Using the Impress program, you can add multimedia files, including audio, image, and video files, to the presentation
    13·2 answers
  • Which combining form is spelled incorrectly? group of answer choices gynic/o carcin/o nephr/o laryng/o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!