1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
6

Exercise 3.7.1: Proving statements about odd and even integers with direct proofs. info About Each statement below involves odd

and even integers. An odd integer is an integer that can be expressed as 2k 1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer.
Computers and Technology
1 answer:
Llana [10]3 years ago
8 0

The question is incomplete. The complete question is :

Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k+1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer. Prove each of the following statements using a direct proof. (a) The sum of an odd and an even integer is odd. (b) The product of two odd integers is an odd integer.

Solution :

Odd number integers = 2k + 1, where k is integer

Even number integer = 2k

a). Odd integer + even integer

  = 2k + 1 + 2k

 = 4k + 1

  = 2(2k) + 1

Let 2k = t, where t is integer

   = 2t + 1

  = Odd integer by definition

If number is 2t + 1 where t belongs to integer, then it is odd integer.

Hence proved.

b). Product of two odd integers :  $2k_1 + 1,\ \  2k_2 +1 $   where $k_1, k_2 $ belongs to integer.

$(2k_1+1)(2k_2+1)= 4k_1k_2+2k_1+2k_2+1$

$2(2k_1k_2)+2(k_1+k_2)+1$

Let $2k_1k_2 = a$ and $k_1+k_2 = b $

here, a and b belongs to integers since $k_1$ and $k_2$ are integers.

We get:

2a+2b+1

= 2(a+b)+1

= 2l + 1,             Let (a+b)=l and l belongs to integers.

It is odd integer by definition.

Hence proved.

 

You might be interested in
Ontext clues can be used to determine the _____ of an unfamiliar word
Solnce55 [7]
Meaning of the word.

6 0
3 years ago
Howie is a business analyst who is given access to the database of a product prior to its launch. He needs to understand the dat
Kisachek [45]

Answer:

D) use SQL or graphical tools to query the database            

Explanation:

To query the database using SQL or graphical tools will help Howie to retrieve bulk of records from the database according to his requirements and it will help to understand and work with the data in a better way than using the data in raw form.

SQL is a language of database used to manipulate and manage the data in the relational database and to query the database.

It is an easy and faster way to query using SQL or graphical tools because no coding is required here.

Different graphical tools are used to present the data in the database in a way that can be easily understood by a person. Different interfaces are provided to visualize the database tables or schema diagrammatically e.g in the form of graphs etc. Different views of the database can be provided to different users according to their requirement and what information they required to be presented.

6 0
3 years ago
2. Write a simple program in C++ to investigate the safety of its enumeration types. Include at least 10 different operations on
erastovalidia [21]

Answer:

Check the explanation

Explanation:

To solve the question above, we will be doing some arithmetic and bit wise operations on enum values. in addition to that, we are asserting the array with INTCOUNT  and also printing the size of array i.e 12 and we are adding BIG_COUNT enum value to 5 and the result is 25.

#include<stdio.h>

enum EnumBits

{

ONE = 1,

TWO = 2,

FOUR = 4,

EIGHT = 8

};

enum Randoms

{

BIG_COUNT = 20,

INTCOUNT = 3

};

int main()

{

// Basic Mathimatical operations

printf("%d\n",(ONE + TWO)); //addition

printf("%d\n",(FOUR - TWO)); //subtraction

printf("%d\n",(TWO * EIGHT)); //multiplication

printf("%d\n",(EIGHT / TWO)); //division

// Some bitwise operations

printf("%d\n",(ONE | TWO)); //bitwise OR

printf("%d\n",(TWO & FOUR)); //bitwise AND

printf("%d\n",(TWO ^ EIGHT)); //bitwise XOR

printf("%d\n",(EIGHT << 1)); //left shift operator

printf("%d\n",(EIGHT >> 1)); //right shift operator

// Initialize an array based upon an enum value

int intArray[INTCOUNT]; // declaring array

// Have a value initialized be initialized to a static value plus

int someVal = 5 + BIG_COUNT; //adding constant and BIG_COUNT variable

printf("%d\n",someVal); //value will be 25

printf("%d",sizeof(intArray)); //value will be 12

return 0;

}

Kindly check the attached image below for the Code and Output Screenshots:

6 0
3 years ago
Acess labeling windows​
Debora [2.8K]

Answer:

I got the same thing

Explanation:

8 0
3 years ago
What were the advantages and disadvantages of agricultural technology to us.
Digiron [165]

Advantages of technology in agriculture include expediting crop production rate and crop quantity, which in turn reduces costs of production for farmers and food costs for consumers, and even makes crops more nutritious and livestock bigger and meatier.

The excessive use of chemicals by the help of machines reduces the fertility of the land.Lack of practical knowledge the farmers cant handle the machines properly.While the cost of maintenance is very high.Overuse of machines may lead to environmental damage.It is efficient but has many side effects and drawbacks.

5 0
3 years ago
Read 2 more answers
Other questions:
  • When pasting an object which has been copied from a different slide, where on the slide does the object paste, assuming nothing
    15·1 answer
  • What is a “spoof” of an ad ?
    8·2 answers
  • This activity will help you meet these educational goals:
    7·2 answers
  • A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices.
    13·1 answer
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro
    8·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Of what is famous Ted Nelson?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!