Discrete Algebra - Sequences and Series Arithmetic Progression

Discrete Algebra - Sequences and Series Arithmetic Progression An arithmetic progression is a sequence in which each term (after the first) is determined by adding a constant to the preceding term. This constant is called the common difference of the arithmetic progression. An arithmetic progression can be defined as follows: The arithmetic progression { an } = a1, a2, a3, ...., an , where n = 1, 2, 3, . . . Its terms are determined by the equation: an = a1 + (n - 1)d, where a1 is the first term of the arithmetic progression an is the nth term of the arithmetic progression n is the term number d is the common difference of the arithmetic progression The sum of the first n terms of an arithmetic progression is calculated as Sn = n ( a1 + an ) / 2 or Sn = n ( 2a1 + (n - 1)d ) / 2 where an = a1 + (n - 1)d EX. For the sequence { an } = 1, 3, 5, 7, 9, ..... where an = 2n - 1 an = 2n - 1 = 1 + 2n - 2 = 1 + 2(n-1) The sequence { an } = 1, 3, 5, 7, 9, ..... is an arithmetic sequence with a1 = 1 and d = 2. The 6th to 10th terms of this arithmetic progression are a6 = 1 + 2(6-1) = 1 + 10 = 11 a7 = 1 + 2(7-1) = 1 + 12 = 13 a8 = 1 + 2(8-1) = 1 + 14 = 15 a9 = 1 + 2(9-1) = 1 + 16 = 17 a10 = 1 + 2(10-1) = 1 + 18 = 19 The sum of the first n terms of the sequence { an } = 1, 3, 5, 7, 9,. . . is Sn = n (2(1) + (n - 1)2) / 2 = n (2 + 2n - 2) / 2 = 2n2 / 2 = n2 We can

  • Word count: 587
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Which is more attractive in Wheatley, intrinsic or extrinsic values of houses?

Geography Coursework: Which is more attractive in Wheatley, intrinsic or extrinsic values of houses? Author: Chris Edson School: Abingdon School Candidate Number: 5054 Total Word Length: Programme Used: Microsoft Word 2000 Hardware Used: Amd Athlon, Home Computer Apple i-Mac, School Computer Contents . Introduction .1 Background 1.1.2 Wheatley in the past 1.1.3 Wheatley today 1.2 Aims .3 Objectives .4 Hypotheses .5 Theory 2. Methodology 2.1 Primary data 2.1.1 Questionnaire 2.1.2 Other primary data 2.1.3 Secondary data 2.2 Scope 2.3 Limitations 2.3.1 Operator error 2.3.2 Technical 3. Data Presentation 4. Interpretation & Evaluation 5. Conclusion References Oxfordshire Records Office Centre for Oxfordshire Studies, Westgate Library Wheatley Archive group Oxfordshire County Council Planning Dept Land and Records - Highways Dept Landscape and Environment Dept Wheatley Newsletters (July/August 2003) Wheatley Information booklet (2000) Wheatley Society - Jim Watson Glynn, P (1988) Fieldwork - firsthand Geography Coursework Information Booklet Centenary of the Merry Bells, Wheatley, 1888-1988 . Introduction .1 Background I am doing my project on the village where I live, Wheatley. It has a population of c.4000. I have chosen Wheatley because it is the easiest place for me to collect data and research and I am quite

  • Word count: 2316
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

NCC International Advanced Diploma in Computer Studies

NCC International Advanced Diploma in Computer Studies Internet System Administration Prepared by: Table of Content TASK 1 4 A) ROBOTS OR SPIDERS 4 How Robots Follow Links to Find Pages ? 4 B) UPDATING UNIX DISTRIBUTION AND KERNEL 6 Unix Structure 6 Update UNIX distribution and kernel 7 Security needs and stability needs for update kernel and distribution 7 Procedure difference among UNIX world 7 C) USE SAMBA TO REDUCE COMPLEXITY FOR ENVIRONMENT 8 D) COMMON GATEWAY INTERFACE 9 Common Gateway Interface (CGI) scripts 9 GET and POST 9 E) LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) 10 F) WINDOWS ACTIVE DIRECTORY 11 TASK 2A 12 2A) WINDOWS UPDATE 12 2Ai) Procedure for the update 12 2Aii) A short report on experience 13 Lesson learnt 14 Evidence to show the upgrade process (Before upgrade) 14 Evidence to show the upgrade process (After upgrade) 15 TASK 2B 16 2B) WINDOWS ADMINISTRATION 16 2Bi) The summary of software installed on local computer can be found in the registration. 16 Sample content for the hardware configuration 17 Sample content for the software configuration 18 2Bii) Application groups and access permission 18 2Biii) All services available on the system 19 TASK 3A 20 3A) COMMON CHARACTERISTIC 20 3Ai) User-friendliness 20 3Aii) Mismatching of functionalities of menu driven tools with the command line tools 22 3Aiii)

  • Word count: 3602
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Privacy on the web and Identity Theft

Privacy on the Web and the Identity Theft Course Title MSc Internet and Database System Unit Security Student Name N. Syed Ibrahim Student Number 2527042 Abstract In this modern world widely held of the people using internet, most of them using their personal detail and card details in the internet to buy and sell goods. Cookies are one of the important weapons for the hackers to steal your personal details. Whatever website we are visiting, we might see an advertisement like you won 1 million pound. In this occurrence we will click on the cookies and that will take you to another page and ask you to fill your personal details like first name, sur name, date of birth, e-mail etc. this is one of the way for the hackers to steal the personal information from internet. Majority of people getting affected identity theft in web. Recently report taken by Federal Trade Commission says that every year more than millions of Americans are victims of fraud. The most common frauds are paying money in online, account transaction, buying goods from internet by using credit or debit card, and paying by card from unsecured website. Privacy on the web Privacy issues arise for users on the web: There are so many privacy issues on the web. I had listed some of the effective issues in privacy on the web. Privacy on the website The website can collect almost most of the

  • Word count: 3681
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

JAVA RMI Introduction Design Implementation Testing

JAVA RMI > Introduction > Design > Implementation > Testing INTRODUCTION: Remote method invocation allows applications to call object methods located remotely, sharing resources and processing load across systems. Unlike other systems for remote execution which require that only simple data types or defined structures be passed to and from methods, RMI allows any Java object type to be used - even if the client or server has never encountered it before. RMI allows both client and server to dynamically load new object types as required. Remote Method Invocation (RMI) facilitates object function calls between Java Virtual Machines (JVMs). JVMs can be located on separate computers - yet one JVM can invoke methods belonging to an object stored in another JVM. Methods can even pass objects that a foreign virtual machine has never encountered before, allowing dynamic loading of new classes as required. DESIGN: In order to understand the design of the RMI program, it is important to comprehend the way that RMI functions, a brief look at the RMI architecture will help explain the design of our program. RMI architecture: > The server must first bind its name to the registry > The client lookup the server name in the registry to establish remote references. > The Stub serializing the parameters to skeleton, the skeleton invoking the remote method and serializing the

  • Word count: 1314
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Describe three of the main methods of site location techniques used by modern archaeologists and assess their effectiveness.

Describe three of the main methods of site location techniques used by modern archaeologists and assess their effectiveness. Although the human eye is an extremely important instrument in the location of rescue archaeology sites, over the years, more advanced techniques have been developed. In this essay, I shall look at three of these: * Geological Survey techniques * Ground Survey techniques * Metal Detectors Geological Survey involves the use of a variety of methods and techniques to produce a detailed map of what is below the surface of the area being surveyed. The primary techniques are Magnetometry and Resistivity. Geophysical survey techniques are the most commonly used method of site identification when a suspected archaeological site lies beneath the land surface. They are non-intrusive and are subsequently invaluable when excavation is not possible. Before conducting either a Geological Survey, or a Ground Survey, a grid needs to be created for the area under investigation. Control points are established which allow the site to be synchronized with the National Grid. First of all, a Baseline is established in the prevailing direction of the site. The ends of this are co-ordinated by Triangulation. This fixes the baseline to the surround area, usually by using tape, which is then broken up into suitable units marked by stakes placed in the ground. Once this

  • Word count: 1312
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Sequences and series investigation By Neil

Sequences and series investigation By Neil In this investigation I have been asked to find out how many squares would be needed to make up a certain pattern according to its sequence. The pattern is shown on the front page. In this investigation I hope to find a formula which could be used to find out the number of squares needed to build the pattern at any sequential position. Firstly I will break the problem down into simple steps to begin with and go into more detail to explain my solutions. I will illustrate fully any methods I should use and explain how I applied them to this certain problem. I will firstly carry out this experiment on a 2D pattern and then extend my investigation to 3D. The Number of Squares in Each Sequence I have achieved the following information by drawing out the pattern and extending upon it. Seq. no. 1 2 3 4 5 6 7 8 No. Of cubes 1 5 13 25 41 61 85 113 I am going to use this next method to see if I can work out some sort of pattern: Sequence Calculations Answer =1 1 2 2(1)+3 5 3 2(1+3)+5 13 4 2(1+3+5)+7 25 5 2(1+3+5+7)+9 41 6 2(1+3+5+7+9)+11 61 7 2(1+3+5+7+9+11)+13 85 8 2(1+3+5+7+9+11+13)+15 113 9 2(1+3+5+7+9+11+13+15) +17 145 What I am doing above is shown with the aid of a diagram below; If we take sequence 3: 2(1+3)+5=13 2(1 squares) 2(3 squares) (5 squares) The Patterns I Have Noticied in Carrying Out the

  • Word count: 1877
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

LabExperiment2Report

Lab Experiment 2: Database Table creation, Maintenance & Views 2.3: Preparation (1) The primary key of a table is a column (or combination of columns in a table) that are used to uniquely identify rows in a table. This means that two different rows in a table may never have the same value in their primary key, and for every row in the table the primary key must have a value. Therefore, if the primary key column(s) are declared NULL, two or more rows in the primary key can have identical values and thus they will NOT be unique. Also the definition of the primary key states that a primary key must have a value and by declaring it NULL, the user has an option of leaving it empty, which is violating the primary key's rules. The primary key column(s) must be declared NOT NULL, to maintain the integrity of data which is entered in the primary key column. A NULL values is treated by mathematically operators, such as average, like any numeric value. These functions operate on the NULL without any problem, but produce an answer which has a value NULL. (4) The following are the entities that will be tested for normalisation, using the 1NF, 2NF and 3NF: SUPPLIER (CODE, NAME, CONTACT, ADDRESS 1, ADDRESS 2, POST CODE, TOWN, PHONE, FAX). INVENTORY (ITEM_CODE, STORE_LOCATION, QUANTITY). st Normalisation Form (1NF) basically states that the entity is in the 1NF if it consists of

  • Word count: 622
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What is a data frame? Show the layout of a data frame from a lower layer protocol (name the protocol) and describe its fields.

What is a data frame? Show the layout of a data frame from a lower layer protocol (name the protocol) and describe its fields. A data frame is used to describe a transmission packet in bit oriented protocols. It usually includes the original data with each higher layer's header, and data link layer its own header/trailer. The header has information about the destination where the data is going. Its purpose is to make sure each data reaches the correct destination. Here is an example of a DIX 8 Preamble 6 Dest. Addr. 6 Source Addr. 2 Type 46-1500 Data 4 CRC DIX data frame use a 6 octets to synchronize the transmitter and receiver. Receiver uses the synchronization bits to sense the incoming message and establish time or synchronization with the transmitter. The preamble is a bit pattern used to identify the start of the frame. The next field after the Preamble field is the 48 bits destination address, which identified the receiver. The field after is the source address, which used to identify the sender; it is also a 48-bit field. There are 3 address types, which are used for a destination address: * Address of a specific workstation, * A general address to a group of workstations * A broadcast address to all workstation The type field identifies the destination network protocol for the frame data. It verifies the type of the data. The CRC (Frame

  • Word count: 2146
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

A Report On Software Quality.

A Report On Software Quality Submitted By:- << Your Name Goes Here>> Table of Contents * Introduction * More on Software Quality .. * Conclusion Introduction "Quality of software product is often described in vague and broad terms. As a consequence it makes it difficult for software engineers and users to determine how quality influences their assignment and it is almost impossible for test engineers to evaluate the quality of the software product as no concrete and quantitative reference, of what quality in that context means, exists. Hence a possible way to define and measure software product quality is required. The expert designers and system analysts in general apply several methods of quality control during the differenct stages of the development of softwares." More on Software Quality... 'Software quality' is gaining its due importance. Many people think of the phrase as an contradiction, much like 'military intelligence' and 'obedient teenager'. Flawed software is widely believed to be the reason for several spectacular mission failures. The most recent of these being NASA's Mars Observer, which became silent, just three days before it was scheduled to enter its orbit around that planet. Software quality is real. The challenge lies in measuring this intangible feature, so that it can be controlled and improved. And the smart thing to do when

  • Word count: 1288
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay