1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
10

Try using the inv command to find the inverse of the matrix Notice the strange output. Include your command and the output in yo

ur write-up. Now enter the following matrix A into MATLAB: >> A = [4 9; 5 11] Define B to be its inverse in MATLAB. Then run the commands >> A*B >> B*A to check that it satisfies the definition of inverse. Include your commands and their output in your write-up. (Note that MATLAB may give you entries like -0.0000 in your results. This still counts as 0 for our purposes.) Enter the following column vector x: >> x = [5; 10] Use the following command to multiply A by x: >> y = A*x As usual, include your input and output in your write-up. Without entering anything into MATLAB, what do you think you'll get if you multiply B by y? Explain your answer. Use MATLAB to check your answer to the last question, and include your input and output in your document.
Computers and Technology
1 answer:
denpristay [2]3 years ago
3 0

Answer:

a)

inv([1 1; 100 100])

warning: matrix singular to machine precision

warning: called from ATest at line 1 column1

ans =

Inf Intf

Inf Inf

b)

A = [4, 9; 5, 11]

B = inv(A)

A*B

B*A

4. 9

5 11

-11.0000 9.0000

5.0000 4.0000

ans . 00000 -0.00000

0 . 00000 1.00000

ans 1.00000 0.00000

0.00000 1.00000

c)

x = [5; 10]

y = A*x

x = [5; 10]

y=

110 135"

d)

B * y is

5.0000

10.0000

e)

B * y

ans 5.0000

10.0000

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
vovikov84 [41]
I suggest you to read OpenSSL changelogs to make it more clear. As there's not enough space to describe how it works. But heartbleed resistan version was 1.0.2, as I know.
5 0
3 years ago
Read 2 more answers
Who do you understand by term DATA give example? please give answer in own words​
xeze [42]

Answer:

The term data is simply defined as “facts and figures”. Each piece of data is a little fact that doesn't mean much on its own. The word data can be used for a singular fact or a collection of facts. It comes from the Latin word datum, meaning “something given”.Data is defined as facts or figures, or information that's stored in or used by a computer. An example of data is information collected for a research paper. An example of data is an email. ... Statistics or other information represented in a form suitable for processing by computer.

4 0
3 years ago
Read 2 more answers
What is the Moore's law
Nadya [2.5K]

Answer:

Hi, in the law of Moore we can express aproxitmaly for each <em>two years</em> is duplicated the number of transitors in a microprocessor.

Explanation:

In around 26 years the number of transitors has increased about 3200 times, a transitor is a way to regulate the current voltage flow and can be act like a <em>switch</em> for an electronic signal.

I hope it's help you.

4 0
3 years ago
Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?.
telo118 [61]

Answer:

Bad Ram or CPU/GPU Problems

Explanation:

It depends on the motherboard used in the type of PC you'd have to look up the number of beeps and the time spread out to figure out your certain issue.

3 0
2 years ago
Other questions:
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • Guardrails are often used by employers to protect workers from falls. How high must the top guardrail be above the working surfa
    12·1 answer
  • What is a geotag?
    10·1 answer
  • Please answer fast screenshot included - thanks in advance
    11·1 answer
  • Rainfall_mi is a string that contains the average number of inches of rainfall in Michigan for every month (in inches) with ever
    12·1 answer
  • 14 Convert the<br>following binary<br>numbers to decimal <br>0011​
    10·2 answers
  • Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbe
    8·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
  • Question #3
    15·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!