1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

For each part create a vector n in which the first element is 1, the increment is 1 and the last term is 5, 50, or 5,000. Then u

se element-by-element calculations to create a vector in which the elements are 1 n 2 1n2. Finally, use MATLAB’s built-in function sum to sum the series. Compare the values to π2 / 6. Use format long to display the numbers.
Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
4 0

Answer:

a = 1:5

b = 1:50

c = 1:5000

Explanation: the file script will be.

format long

% Part (a) n=1:5;

an=1./n.^2;

Sa=sum(an)

pi_sq_ov6=pi^2/6

% Part (b) n=1:50;

an=1./n.^2;

Sb=sum(an)

pi_sq_ov6=pi^2/6

% Part (c)

n=1:5000;

an=1./n.^2;

Sc=sum(an)

pi_sq_ov6=pi^2/6

Finding each values in the above, the command window will have the following values.

Command Window:

Sa = 1.463611111111111

pi_sq_ov6 = 1.644934066848226

Sb = 1.625132733621529

pi_sq_ov6 =1.644934066848226

Sc = 1.644734086846901

pi_sq_ov6 = 1.644934066848226

You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
AysviL [449]

Answer:

The correct answer is BC → A, A does not hold over S. we noticed the tuples (1 ,2 ,3 ) and (4 ,2 ,3) which can hold over S)

Explanation:

Solution

No, since in this case the instance of S is provided. so such particular dependencies are unable to breach through such instance, but unable to tell which the dependencies hold towards S.

A functional dependency holds towards only when a relation forms a statement regarding the complete allowed instances of relation.

8 0
3 years ago
Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
creativ13 [48]

Answer:

The answer is "Option c"

Explanation:

The W3C is the framework for the creation of software and the online standards through which sites and webpages work, and to turn into an authoritative source of information, she will work towards getting a reliable and credible source of knowledge from the "World Wide Web Consortium", and the wrong option can be described as follows:

  • In option a, It is wrong because this organization prepares and publishes all the electronic technologies.
  • In option b, It is wrong because it is the laboratory of physics, which is not useful in web development.
  • In option d, This technology is used in TCP/IP protocol, that's why it is incorrect.
3 0
3 years ago
Help ne please!! Even if I press 3 times it doenst work.. when I try to turn it off either. Any suggestions? (using ipad)​
arlik [135]

Answer: Have you tried restarting your ipad or Shutting down? Or closing your ipad and waiting for a little bit so It can leave Or you can try Pressing it harder.

Explanation:

Thats all I have to help

8 0
3 years ago
Explain the principles of computer applications ​
9966 [12]

Answer:

The nature of computers and code, what they can and cannot do.

How computer hardware works: chips, cpu, memory, disk.

Necessary jargon: bits, bytes, megabytes, gigabytes.

How software works: what is a program, what is "running"

How digital images work.

Computer code: loops and logic.

Big ideas: abstraction, logic, bugs.

3 0
3 years ago
Other questions:
  • Oxygen-18 has an atomic number of 8. How many neutrons are in this isotope?
    7·1 answer
  • This term describes two or more arrays that hold related data, and the related elements in each array are accessed with a common
    15·1 answer
  • Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems,
    13·1 answer
  • When using correct ergonomic technique be sure to
    6·2 answers
  • If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem.
    14·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • er reports that he is having problems with his monitor. He explains that his laptop's liquid crystal display (LCD) is no longer
    13·1 answer
  • AYUDAAAA!!!!! URGENTE!!!!!!1<br> ¿para que sirve la "BIG DATA"?
    9·1 answer
  • Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
    5·1 answer
  • Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!