1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
10

Write a MATLAB program to accomplish the following: Create two vectors, a and b, where vector a contains all positive integers l

ess than 100 that are evenly divisible by 10, and b contains all positive, even integers greater than 0 and less than or equal to 18. Divide the values in vector a, element by element, by the values in vector b, and assign the result to vector c. Square all the elements of vector c and then subtract 19 from every squared element of c. Assign the result to vector d. ONLY display the values of c, and d in the Command Window.
Computers and Technology
1 answer:
sattari [20]3 years ago
3 0

Answer:

Explanation:

Below is the complete MATLAB code that performs the given operations.

a = 10:10:99 % Generating first vector

b = 2:2:18  % Generating 2nd vector

c = rdivide(a,b) % Dividing vector a by b and storing in c

d = times(c,c) -19 % Subtracting 19 from each element of vector c

c % Displaying value of c

d % Displaying value of d

Output screenshot

C =

 5 5 5 5 5 5 5 5 5

d =

6 6 6 6 6 6 6 6 6

You might be interested in
Super computer in nuclear energy ​
satela [25.4K]

Answer:

Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.

4 0
3 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
A posting error is:
Sunny_sXe [5.5K]

Answer:

The correct answer to the given question is option D) Any or all of the above.

Explanation:

A posting error is a type of error which is related to ledger and would include the errors like -

Posting wrong amount on the right side of account

Posting right amount on the wrong side of right account

Posting an amount twice and posting omission

Posting wrong amount to wrong side of right account

Posting correct amount on wrong account on right side

So by knowing all the given above points, it is quite clear that the correct option is D.

7 0
3 years ago
Assume that you have 22 slices of pizza and 7 friends that are going to share it (you've already eaten). There's been some argum
xz_007 [3.2K]

Answer:

In Python:

numberOfWholeSlices = int(22/7)

print(numberOfWholeSlices )

Explanation:

For each friend to get a whole number of slices, we need to make use of the int function to get the integer result when the number of slices is divided by the number of people.

So, the number of slice is: 22/7

In python, the expression when assigned to numberOfWholeSlices  is:

numberOfWholeSlices = int(22/7)

Next, is to print the calculated number of slices

print(numberOfWholeSlices )

4 0
3 years ago
Which of these is one of the primary concerns for protecting your family when online?
Lady_Fox [76]
Sharing personal information
7 0
2 years ago
Read 2 more answers
Other questions:
  • What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out
    9·1 answer
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • What is the decimal equivalent of the binary number 1102?
    8·2 answers
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • Which of these is most closely associated with system control? (1 point) (Points : 1.5) boundary
    10·1 answer
  • What is human data,
    8·1 answer
  • Which of these is NOT a mathematical operator used in Python?
    12·1 answer
  • Five technology tools and their uses​
    5·1 answer
  • What do you call the quality of information
    5·1 answer
  • The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!