1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

For each part create a vector n in which the first element is 1, the increment is 1 and the last term is 5, 50, or 5,000. Then u

se element-by-element calculations to create a vector in which the elements are 1 n 2 1n2. Finally, use MATLAB’s built-in function sum to sum the series. Compare the values to π2 / 6. Use format long to display the numbers.
Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
4 0

Answer:

a = 1:5

b = 1:50

c = 1:5000

Explanation: the file script will be.

format long

% Part (a) n=1:5;

an=1./n.^2;

Sa=sum(an)

pi_sq_ov6=pi^2/6

% Part (b) n=1:50;

an=1./n.^2;

Sb=sum(an)

pi_sq_ov6=pi^2/6

% Part (c)

n=1:5000;

an=1./n.^2;

Sc=sum(an)

pi_sq_ov6=pi^2/6

Finding each values in the above, the command window will have the following values.

Command Window:

Sa = 1.463611111111111

pi_sq_ov6 = 1.644934066848226

Sb = 1.625132733621529

pi_sq_ov6 =1.644934066848226

Sc = 1.644734086846901

pi_sq_ov6 = 1.644934066848226

You might be interested in
What would you use to compare two date ranges in a report?
Katyanochek1 [597]
The solution is Date variety comparison.
The date variety selector is on the top proper of each record besides the real-Time reviews. To compare two exclusive date ranges, pick the evaluate to other dates checkbox, use the controls to set the second date range, then click on follow. now not all graph types guide date evaluation.
7 0
2 years ago
Quiz
UkoKoshka [18]

Answer:

The correct choice is "Inappropriate content can be accessed accidentally".

Explanation:

It is also known as insufficient material, which includes the information or photographs which distress the child, adult material, incomplete data, or feedback, which can lead to illegal or dangerous actions of the child. On the internet, it enables the computer, which may have improper content access, and the wrong choice can be defined as follows:

  • It does not appears on the website.
  • The people will not be inclined for looking in the inadequate material.  
  • There are no few resources available to prevent inappropriate conductors.
3 0
3 years ago
Read 2 more answers
List three ways of breaking a copyright law with the illegal copy of software.​
erma4kov [3.2K]

Answer:

  • Using it
  • Selling it
  • Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

4 0
3 years ago
What is the name used for the integrated program development environment that comes with a Python installation?
r-ruslan [8.4K]

Answer:

IDLE

Explanation:

IDLE is the standard Python development environment. Its name is an acronym of "Integrated DeveLopment Environment". It works well on both Unix and Windows platforms.

It has a Python shell window, which gives you access to the Python interactive mode. It also has a file editor that lets you create and edit existing Python source files. IDLE is intended to be a simple IDE and suitable for beginners, especially in an educational environment. To that end, it is cross-platform, and avoids feature clutter.

8 0
3 years ago
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
Anna71 [15]
Important tools used in the "Define" phase of the DMAIC process include a project charter, a description of customer requirements, process maps, and Voice of the Customer (VOC) data.
6 0
3 years ago
Other questions:
  • Consider the attack scenario given below:
    8·1 answer
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • Whats the size of a short bond paper in microsoft word?
    10·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • What are the ethical implications of online social media after someone has died
    8·2 answers
  • Why did Simon bring Michael home?​
    9·2 answers
  • How to Create a while loop
    6·2 answers
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • Which of the following has the greatest impact on telecommunications design?
    12·2 answers
  • In large organizations, database design and management is handled by a database _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!