Answer:
Go to explaination for the step by step answer.
Explanation:
a)Code
function[y]=operation(x) % this function takes x as input and returns y as output
y=(-0.2*x^3+7*x^2)*exp(-0.3*x)
end
% call this function in command widow by typing operation(value of x) like shown in figure in the first attachment.
b. write a code of above function in one script window and save the code with same name as name of function that is name of script should be saved as operation.Now copy paste the below code in new script window and run the code
clc
clear all
x=-2:.1:6
n=length(x)
for i=1:1:n
a=x(i)
y(i)=operation(a)
end
plot(y,x)
xlabel('X')
ylabel('Y')
Please kindly check attachment for pictorial answers that supports the code.
If an algorithm's resource consumption, often referred to as computational cost, is at or below a certain threshold, it is said to be efficient. Generally speaking, "acceptable" indicates that it will operate on a machine that is available in a fair amount of time or space, usually based on the size of the input.
<h3>Explain about the efficiency of an algorithm?</h3>
Growth requires an understanding of an algorithm's effectiveness. Programmers write code with the future in mind, and efficiency is essential to achieve this. Reducing the number of iterations required to finish your task in relation to the size of the dataset is the goal of efficient algorithm development.
The use of asymptotic analysis can frequently help to solve these issues. As the size of the input increases, asymptotic analysis quantifies an algorithm's effectiveness or the program that implements it.
To express how time-consuming a function is, we use a method called "Big O notation." We use the Big O notation, a language, to describe how time-consuming an algorithm is. It's how we assess the value of several approaches to an issue, and U supports our decision-making.
To learn more about efficiency of an algorithm refer to:
brainly.com/question/13801939
#SPJ4
Answer:
While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.
An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).
CLIENT-SERVER
The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.
INTRANET
Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.
EXTRANET
Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.
Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).