1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
10

Try using the inv command to find the inverse of the matrix Notice the strange output. Include your command and the output in yo

ur write-up. Now enter the following matrix A into MATLAB: >> A = [4 9; 5 11] Define B to be its inverse in MATLAB. Then run the commands >> A*B >> B*A to check that it satisfies the definition of inverse. Include your commands and their output in your write-up. (Note that MATLAB may give you entries like -0.0000 in your results. This still counts as 0 for our purposes.) Enter the following column vector x: >> x = [5; 10] Use the following command to multiply A by x: >> y = A*x As usual, include your input and output in your write-up. Without entering anything into MATLAB, what do you think you'll get if you multiply B by y? Explain your answer. Use MATLAB to check your answer to the last question, and include your input and output in your document.
Computers and Technology
1 answer:
denpristay [2]3 years ago
3 0

Answer:

a)

inv([1 1; 100 100])

warning: matrix singular to machine precision

warning: called from ATest at line 1 column1

ans =

Inf Intf

Inf Inf

b)

A = [4, 9; 5, 11]

B = inv(A)

A*B

B*A

4. 9

5 11

-11.0000 9.0000

5.0000 4.0000

ans . 00000 -0.00000

0 . 00000 1.00000

ans 1.00000 0.00000

0.00000 1.00000

c)

x = [5; 10]

y = A*x

x = [5; 10]

y=

110 135"

d)

B * y is

5.0000

10.0000

e)

B * y

ans 5.0000

10.0000

You might be interested in
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
Ad libitum [116K]

Answer:

a) all cabling hope it helps

3 0
2 years ago
Why is it important for people to express resentments in the workplace?
svp [43]

C. Unexpressed resentments can build and hamper work

5 0
3 years ago
Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
schepotkina [342]
well i dont know but i would go with b :D

4 0
3 years ago
Meg[] elements = {new Lois(), new Stewie(), new Meg(), new Brian()}; for (int i =0; i
Stells [14]

Complete question is attached as snapshot.

Answer:

This will result in a compilation error.

Here's the inheritance hierarchy:

Meg -> Lois -> Brian -> Stewie

Now Meg has 2 public Fxns, a() and toString().

Lois inherits from Meg and all its public functions as well but, overrides the a() fxn of its super class.

So finally Lois has fxns a(), b() and toString().

Brian extends Lois and inherits all the above listed fxns of Lois, but overrides the b() and toString() fxns.

Stewie extends Brian and inherits all the fxns of Brian, but overrides the a() and toString() fxns.

In the Main driver fxn, we call a() and b() methods of all these classes but, the base class Meg has no b() and it is not extending any class so its not available in its scope.

This results in a compilation error.

Explanation:

7 0
3 years ago
How do power strips work?
lapo4ka [179]
What are power strips please
3 0
3 years ago
Other questions:
  • Laura is photographing her son’s baseball game. What ISO setting should she use?
    11·1 answer
  • Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.
    6·1 answer
  • Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
    14·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • PLEASE ANSWER ASAP
    7·1 answer
  • What is the default font style of “Title” box in MS PowerPoint 2013?
    8·1 answer
  • Match the elements used in web searches to their functions.
    12·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
  • A leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate h
    14·1 answer
  • What was the first computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!