Professional Documents
Culture Documents
Student Name/ID
Unit Title Unit 11 : Maths for Computing
LO3 Determine solutions of graphical examples using geometry and vector methods.
Pass, Merit & P5 P6 M3 D3
Distinction Descripts
LO4 Evaluate problems concerning differential and integral calculus.
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately
filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work and to
present it as my own without attributing the sources in the correct way. I further understand
what it means to copy another’s work.
Action Plan
Summative feedback
Assessor’s
Date
Signature
Assignment Brief
Unit Tutor
Issue Date
Submission Date
Submission Format:
This assignment should be submitted at the end of your lesson, on the week stated at the front of this
brief. The assignment can either be word-processed or completed in legible handwriting.
If the tasks are completed over multiple pages, ensure that your name and student number are present on
each sheet of paper.
Part 1
1. A tailor wants to make square shaped towels. The required squared pieces of cloth will
be cut from a ream of cloth which is 20 meters in length and 16 meters in width.
a) Find the minimum number of squared pieces that can be cut from the ream of cloth
without wasting any cloth.
b) Briefly explain the technique you used to solve (a).
2. On the first day of the month, 4 customers come to a restaurant. Afterwards, those 4
customers come to the same restaurant once in 2,4,6 and 8 days respectively.
a) On which day of the month, will all the four customers come back to the restaurant
together?
b) Briefly explain the technique you used to solve (a).
Part 2
3. Logs are stacked in a pile with 24 logs on the bottom row and 10 on the top row. There
are 15 rows in all with each row having one more log than the one above it.
a) How many logs are in the stack?
b) Briefly explain the technique you used to solve (a).
4. A company is offering a job with a salary of Rs. 50,000.00 for the first year and a 4%
raise each year after that. If that 4% raise continues every year,
a) Find the total amount of money an employee would earn in a 10-years career.
b) Briefly explain the technique you used to solve (a).
Part 3
5. Define the multiplicative inverse in modular arithmetic and identify the multiplicative
inverse of 6 mod 13 while explaining the algorithm used.
Activity 02
Part 1
2. The manager of a supermarket collected the data of 25 customers on a certain date. Out
of them 5 purchased Biscuits, 10 purchased Milk, 8 purchased Fruits, 6 purchased both
Milk and Fruits.
Let B represents the randomly selected customer purchased Biscuits, M represents
the randomly selected customer purchased Milk and F represents the randomly
selected customer purchased Fruits.
Represent the given information in a Venn diagram. Use that Venn diagram to answer
the following questions.
a) Find the probability that a randomly selected customer either purchased Biscuits
or Milk.
b) Show that the events “The randomly selected customer purchased Milk” and
“The randomly selected customer purchased Fruits” are independent.
3. Suppose a voter poll is taken in three states. Of the total population of the three states,
45% live in state A, 20% live in state B, and 35% live in state C. In state A, 40% of
voters support the liberal candidate, in state B, 30% of the voters support the liberal
candidate, and in state C, 60% of the voters support the liberal candidate.
Let A represents the event that voter is from state A, B represents the event that voter
is from state B and C represents the event that voter is from state C. Let L represents
the event that a voter supports the liberal candidate.
a) Find the probability that a randomly selected voter does not support the liberal
candidate and lives in state A.
b) Find the probability that a randomly selected voter supports the liberal candidate.
c) Given that a randomly selected voter supports the liberal candidate, find the
probability that the selected voter is from state B.
4. In a box, there are 4 types [Hearts, Clubs, Diamonds, Scorpions] of cards. There are 6
Part 2
6. Two fair cubes are rolled. The random variable X represents the difference between the
values of the two cubes.
Y=y 1 2 3 4 5
P(Y=y) 1/3 1/6 1/4 k 1/6
where k is a constant.
a) Find the value of k.
b) Find P(Y≤3).
c) Find P(Y>2).
Part 3
a) Let X be the number of matches that will be won by the team. What are the
possible values of X?
b) What is the probability that the team will win exactly 6 matches?
c) What is the probability that the team will lose 2 or less matches?
d) What is the mean number of matches that the team will win?
e) What are the variance and the standard deviation of the number of matches that
the team will win?
11. In a boys’ school, there are 45 students in grade 10. The height of the students was
measured. The mean height of the students was 154 cm and the standard deviation was
2 cm. Alex’s height was 163 cm. Would his height be considered an outlier, if the
height of the students were normally distributed? Explain your answer.
12. The battery life of a certain battery is normally distributed with a mean of 90 days and
a standard deviation of 3 days.
For each of the following questions, construct a normal distribution curve and provide
the answer.
a) About what percent of the products last between 87 and 93 days?
b) About what percent of the products last 84 or less days?
For each of the following questions, use the standard normal table and provide the
answer.
c) About what percent of the products last between 89 and 94 days?
d) About what percent of the products last 95 or more days?
13. In the computing field, there are many applications of Probability theories. Hashing
and Load Balancing are also included to those. Provide an example for an application
of Probability in Hashing and an example for an application of Probability in Load
Balancing. Then, evaluate in detail how Probability is used for each application while
assessing the importance of using Probability to those applications.
Part 1
1. Find the equation (formula) of a circle with radius r and center C(h,k) and if the Center
of a circle is at (3,-1) and a point on the circle is (-2,1) find the formula of the circle.
2. Find the equation (formula) of a sphere with radius r and center C(h, k, l) and show that
x2 + y2 + z2 - 6x + 2y + 8z - 4 = 0 is an equation of a sphere. Also, find its center and
radius.
Part 2
Construct an equation to find the volume of the given Tetrahedron using vector methods
and if the vectors of the Tetrahedron are a=(i+4j-2k) , b=(3i-5j+k) and c=(-4i+3j+6k),
find the volume of the Tetrahedron using the above constructed equation..
Activity 04
Part 1
1. Determine the slope of the following functions.
i. f(x) = 2x – 3x4 + 5x + 8
ii. f(x) = cos(2x) + 4x2 – 3
2. Let the displacement function of a moving object is S(t) = 5t 3 – 3t2 + 6t. What is the
function for the velocity of the object at time t.
Part 2
3. Find the area between the two curves f(x) = 2x2 + 1 and g(x) = 8 – 2x on the interval
(-2) ≤ x ≤ 1 .
4. It is estimated that t years from now the tree plantation of a certain forest will be
increasing at the rate of 3t 2 + 5t + 6 hundred trees per year. Environmentalists have
found that the level of Oxygen in the forest increases at the rate of approximately 4
units per 100 trees. By how much will the Oxygen level in the forest increase during the
next 3 years?
Part 3
5. Sketch the graph of f(x) = x5- 6x3 + 3 by applying differentiation methods for analyzing
where the graph is increasing/decreasing, local maximum/minimum points [Using the
6. Identify the maximum and minimum points of the function f(x)= 2x 3 - 4x4 + 5x2 by
further differentiation. [i.e Justify your answer using both first derivative test and
second derivative test.]
1)
a) length = 20 m width = 16 m
square shape towel area = 20 m x 16 m
= 320 m2
B) The largest number, which is the factor of two or more number is called the Greatest Common Factor
(GCF). It is the largest number (factor) that divide them resulting in a Natural number. Once all the factors
of the number are found, there are few factors which are common in both. The largest number that is found
in the common factors is called the greatest common factor. The GCF is also known as the Highest
Common Factor (HCF)
After 25 days……..
b) The least common multiple, or LCM, is another number that's useful in solving many math problems.
Let's find the LCM of 30 and 45. One way to find the least common multiple of two numbers is to first list
the prime factors of each number.
30 = 2 × 3 × 5
45 = 3 × 3 × 5
Then multiply each factor the greatest number of times it occurs in either number. If the same factor occurs
more than once in both numbers, you multiply the factor the greatest number of times it occurs.
2: one occurrence
3: two occurrences
5: one occurrence
2 × 3 × 3 × 5 = 90 <— LCM
After you've calculated a least common multiple, always check to be sure your answer can be divided
evenly by both numbers.
Part 2
3)
a) bottom row = 24 top row = 10 all rows = 15
b) In mathematics, the term “graded” has a number of meanings, mostly related: In abstract algebra, it
refers to a family of concepts: An algebraic structure is said to be -graded for an index set if it has a
gradation or grading, i.e. a decomposition into a direct sum of structures; the elements of.
4)
a) The first year A1 = 50000.00
The growth factor :
= 0.04
A1 , A1( 1 + r ) , A1 ( 1 + r)2 , …………….
S10 = A1 ( 1 – ( 1 + r )10 )
1–(1+r)
= A1 [ ( 1 + r )10 ] - 1
r
= RS.600405.36
b) In mathematics, a growth factor is a multiplier that grows as some independent variable increases. One
of most common examples is the growth of savings interest over time. If one deposits A dollars in a bank
account with a savings interest rate i, the value of the deposit will be A(1+i) over the first period, A(1+i)^2
over two periods, and so on. After n periods, the value of the deposit will be A(1+i)^n. In this example,
(1+i)^n is the growth factor.
Banks usually quote annual interest rates, but they often compound interest more often than annually. If a
bank offers an annual interest rate I compounded quarterly, then the true interest period is three months and
the true interest rate is i=I/4. If a bank has N compounding periods in a year, the true interest rate is i=I/N,
and the growth factor after n periods is (1+I/N)^n, where n is the number compounding periods after the
deposit was made. Every year, there will be N compounding periods. After Y nears, there will have been
n=YN compounding periods, so the growth factor in terms of Y and N is (1+I/N)^(YN) or (1+i)^(1/i)(YI).
If the bank compounded interest continuously (1+i)^(1/i) would be e, the base of natural logarithms, and
the growth factor would be e^(YI) (Anon., n.d.).
Part 3
5) Step 1
Forward part of Euclidean algorithm
13 = 6(2) + 1 ----(1) here 2 is quotas, 1 is reminder
H.C.F (6,13) = 1 so 6 & 13 are relatively prime
Multiplicative inverse of 6 mod 13 exists
Step 2
Backward part of the Euclidean algorithm
From equation
1 = 13 – 6(2)
1 = 13(1) – 6(2)
6) Prime numbers
A prime number is a number greater than 1 with only two factors – themselves and 1.
A prime number cannot be divided by any other numbers without leaving a remainder.
An example of a prime number is 13. It can only be divided by 1 and 13. Dividing a prime number by
another number results in numbers left over e.g. 13 ÷ 6 = 2 remainder 1.
15 is not an example of a prime number because it can be divided by 5 and 3 as well as by itself and 1.
Prime number is important and used mostly for the cryptography in computer security field. Take a look at
an algorithm called RSA (Rivest, Shamir, Adleman). RSA algorithm works by utilising the fact that prime
number factorisation is a hard computing problem. RSA utilising very big prime numbers that takes
considerable amount of time (practically impossible with current computng power and limited time) to
complete factorisation.
This makes RSA algorithm so unique. The concept is very simple, whereby we compute the product of two
very large prime numbers, which can easily be done. However, when people gain access to the one of the
numbers (public key), it is very hard to factor back to get the other number (private key).
Activity 2
Part 1
1)
Conditional probability is defined as the likelihood of an event or outcome occurring, based on the
occurrence of a previous event or outcome. Conditional probability is calculated by multiplying the
probability of the preceding event by the updated probability of the succeeding, or conditional, event.
For example:
1) Event A is that an individual applying for college will be accepted. There is an 80% chance that
this individual will be accepted to college.
2) Event B is that this individual will be given dormitory housing. Dormitory housing will only be
provided for 60% of all of the accepted students.
A conditional probability would look at these two events in relationship with one another, such as the
probability that you are both accepted to college, and you are provided with dormitory housing.
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 7|Page
Conditional probability can be contrasted with unconditional probability. Unconditional probability
refers to the likelihood that an event will take place irrespective of whether any other events have
taken place or any other conditions are present.
KEY TAKEAWAYS
Conditional probability refers to the chances that some outcome occurs given that another event has
also occurred.
It is often stated as the probability of B given A and is written as P(B|A), where the probability of B
depends on that of A happening.
Conditional probability can be contrasted with unconditional probability (Anon., n.d.).
2)
N ( M ) = 10
N(F)=8
N(B)=5
N(M∩F)=6
N ( ɛ ) = 25
a)
b)
8
p(F)=
25
10 2
p(M)= =
25 5
2 8
p(M).p(F)= ×
5 25
16
=
125
BUT
6 16
P(M∩F)= ≠
25 125
؞P(M∩F)≠P(M).P(F)
The events “ The randomly selected customer purchased Milk “ and “ The randomly selected customer
purchased Fruits “ are independent.
3)
45 40
P(A)= = 0.45 P(L|A)= = 0.4
100 100
20 30
P(B)= = 0.2 P(L|B)= = 0.3
100 100
35 60
P(C)= = 0.35 P(L|C)= = 0.6
100 100
a)
P ( L'/A ) = 1 - P ( L | A )
= 1 – 0.4
= 0.6
b)
P(L)=P(L|A).P(A).+P(L|B).P(B)+P(L|C).P(C)
= 0.4 × 0.45 + 0.3 × 0.2 + 0.6 × 0.35
= 0.45
c)
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 10 | P a g e
P(B|L).P(L) = P(L|B).P(B)
¿
P ( B | L ) = P ( L| B ¿ . P (B) P( L)
0.3 ×0.2
=
0.45
= 0.13
4)
a)
There are 5 hearts in the box if one is pulled and not replaced , and 25 total cards remaining
5
P ( Second card is heart ) =
25
1
=
5
3 1
P ( Both are hearts ) = ×
13 5
3
=
65
= 0.046
b) P (one club card and one diamond card) = P (1st Diamond) * P (2nd Club) + P (1st club) * P (2nd
Diamond)
8 7 7 8
¿ × + ×
26 25 26 25
56 56
¿ +
650 650
112
¿
650
P (one club card and one diamond card) = 0.172
P ( Both are same ) = P ( both are hearts ) + P ( both are clubs ) + P ( both are diamonds ) +
P ( both are scorpions )
6 5 7 6 8 7 5 4
P ( Both are same ) = × + × + × + ×
26 25 26 25 26 25 26 25
148
=
650
74
=
325
= 0.228
Part 2
5)
Discrete and Continuous Random Variables:
A probability distribution is a formula or a table used to assign probabilities to each possible value of a
random variable X. A probability distribution may be either discrete or continuous. A discrete distribution
means that X can assume one of a countable (usually finite) number of values, while a continuous
distribution means that X can assume one of an infinite (uncountable) number of different values.
Geometric
Poisson
Normal
The uniform distribution is useful because it represents variables that are evenly distributed over a given
interval. For example, if the length of time until the next defective part arrives on an assembly line is
equally likely to be any value between one and ten minutes, then you may use the uniform distribution to
compute probabilities for the time until the next defective part arrives.
6)
Distances here
1 2 3 4 5 6 ➊
1 0 1 2 3 4 5
2 1 0 1 2 3 4
3 2 1 0 1 2 3
4 3 2 1 0 1 2
5 4 3 2 1 0 1
6 5 4 3 2 1 0
Final count
0 6
1 10
2 8
➋ 3 6
4 4
5 2
All are = 36
a)
6 10 8 6 4 2 0
E(x)=(0× )+(1× )+(2× )+(3× )+(4× )+(5× )+(6× )
36 36 36 36 36 36 36
10 16 18 16 10
= 0+ + + + + +0
36 36 36 36 36
70
=
36
35
=
18
= 1.9444
E(X)
6 10 8 6 4 2 0
V ( X ) = ( 02 × ) + ( 12 × ) + ( 22 × ) + ( 32 × ) + ( 42 × ) + ( 52 × ) + ( 62 × ) - [E
36 36 36 36 36 36 36
( X ) ]2
10 32 54 64 50 70 2
=0+ + + + + +0–( )
36 36 36 36 36 36
210 70 ×70
= -
36 36 ×36
210× 36−4900
=
36× 36
7560−4900
=
1296
2660 1330 665
= = =
1296 648 324
= 2.056
c)
A = x – 10
A values are here
0 -10
1 -9
2 -8
3 -7
4 -6
5 -5
Equation is here
6 10 8 6 4 2
E ( A ) = ( -10 × ) + ( -9 × ) + ( -8 × ) + ( -7 × ) + ( -6 × ) + ( -5 × )
36 36 36 36 36 36
−60 −90 −64 −42 −24 −10
= + + + + +
36 36 36 36 36 36
−290 −145
= =
36 18
= -8.055
1
B=( X)–5
2
B values are here
0 -5
1 -4.5
2 -5
3 -3.5
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 16 | P a g e
4 -3
5 -2.5
Equation here
6 10 8 6 4 2
E ( B ) = ( -5× ) + ( -4.5 × ) + ( -5 × ) + ( -3.5 × ) + ( -3 × ) + ( -2.5 × )
36 36 36 36 36 36
−30 −45 −40 −21 −12 −5
= + + + + +
36 36 36 36 36 36
−153 −51
= =
36 12
= -4.25
d)
6 10 8 6 4 2
V(A)=( (-10)2 × ) + ( (-9)2 × ) + ( (-8)2 × ) + ( (-7)2 × ) + ( (-6)2 × ) + ( (-5)2 × ) - [E ( A ) ]2
36 36 36 36 36 36
100× 6 81× 10 64 ×8 49 ×6 36 ×4 25× 2 −290 2
= + + + + + –( )
36 36 36 36 36 36 36
600 810 512 294 144 50 −290 ×−290
= + + + + + -
36 36 36 36 36 36 36 × 36
2410 84100
= -
36 36 ×36
86760−84100
=
36 × 36
2660 1330 665
= = =
1296 648 324
V[A] = 2.056
SD [ A ]= √V [ A ] =1.434
6 10 8 6 4 2
V(B)=((-5)2 × ) + ((-4.5)2 × ) + ((-5)2 × ) + ((-3.5)2 × ) + ((-3)2 × ) + ((-2.5)2 × ) -[E ( B ) ]2
36 36 36 36 36 36
25× 6 20.25× 10 25× 8 12.25× 6 9 ×4 6.25× 2 −153 2
= + + + + + –( )
36 36 36 36 36 36 36
= 0.514
SD [B] = √ V [ B ] = √ 0.514
SD [B] =0.717
E)
The mean of Brian's score is half that of Amold's. The Brian score has a variance of one-
quarter that of the Amold score. Brian's score has a quality deviation that is half that of the
Amold score.
b)
P(Y≤3)=P(Y=1)+P(Y=2)+P(Y=3)
1 1 1
P(Y≤3)= + +
3 6 4
4+ 2+ 3
=
12
9 3
= =
12 4
= 0.75
c)
P(Y>2)=P(Y=3)+P(Y=4)+P(Y=5)
1 1
P(Y>2)= +k+
4 6
1 1 1
= + +
4 12 6
3+1+2
=
12
6 1
= =
12 2
= 0.5
Part 3
10)
P ( titans win the game = 75% = 75/100 = 0.75
X = 1,2,3,4,5,6,7,8,9,10
b)
10
P(b)= C6 ( 0.75)6 ( 1 – 0.75)10 – 6
10
= C6 ( 0.75)6 ( 0.25)4
10 !
= ( 0.75)6 ( 0.25)4
( 10−6 ) ! 6 !
10× 9 ×8 ×7 × 6 !
= ( 0.75)6 ( 0.25)4
4 ! ×6 !
10× 9 ×8 ×7
= × 0.18 × 0.004
4 × 3× 2× 1
= 210 × 0.18 × 0.004
= 0.1512
c)
Loss – 2 8 win
Loss – 1 9 win
Loss – 0 10 win
= 10C8 ( 0.75 )8 ( 1 – 0.75 )10 – 8 + 10C9 ( 0.75 )9 ( 1 – 0.75 )10 – 9 + 10C10 ( 0.75 )10 ( 1 – 0.75 )10 – 10
10 × 9× 8 ! 10× 9 ! 10 !
= ( 0.75 )8 ( 0.25 )2 + ( 0.75 )9 ( 0.25 )1 + ( 0.75 )10( 0.25 )0
(10−8)!× 8 ! (10−9)! × 9 ! ( 10−10 ) ! ×10 !
90
= × 0.1 × 0.0625 + 10 × 0.075 × 0.25 + 1 × 0.056 × 1
2
= 0.28125 + 0.1875 + 0.056
d)
µ = np
= 10 × 0.75
= 7.5
e)
SD2 = V ( x ) = np ( 1 - p )
= 7.5 × 0.25
= 1.875
SD = √ V (x)
SD = √ 1.875
= 1.369
11)
µ = 154 SD = 2
154 µ - 3σ
= 154 – 3 × 2
= 154 – 6
= 148
µ ± 3σ
= 154 + 6
= 160
There are 163 outliers (extreme points) under the Empirical rule.
163−154
Alex's z-score: z = =4.5.
2
A standard cut-off value for finding outliers are Z-scores of +/-3 or further from zero.
Since 4.5>3, the Alex's height is an outlier.
12)
Empirical rule gives us information about the percentage of data that lies within one, two, and three
deviation of the mean.
µ = 90 standard deviation = 3
a)
87 & 93
According to the empirical rule that the area under the normal curve between µ - σ & µ + σ is 68% the
probability is 0.68
Percentage is 68.2%
b)
84 µ - 2σ
= 90 – ( 2 × 3)
= 84
According to the empirical rule that the area under normal curve less than µ - 2σ is 2.1% + 0.1%
Therefore the percent of the products last 84 or less days
= 0.021 + 0.001
= 0.022
Percent is 2.2%
c)
x−µ
z=
σ
89−90
=
3
= - 0.33 P ( -0.33 ) = 0.37070
x−µ
z=
σ
94−90
=
3
= 1.33 P ( 1.33 ) = 0.90824
The percent of the products last between 89 and 94 days
P ( 1.33 ) – P ( -0.33 )
= 0.90824 – 0.37070
= 0.53754
13)
Families of Hash Functions
to emphasize which specific properties of hash functions are important for a given application, we start by
introducing an abstraction: a hash function is just some computable function that accepts strings as input
and produces numbers between 1 and n as output. We call the set of allowed inputs U (for “Universe”). A
family of hash functions is just a set of possible hash functions to choose from. We’ll use a scripty \
mathscr{H} for our family, and so every hash function h in \mathscr{H} is a function h : U \to \{ 1, \dots,
n \}.
Here we have a family of random hash functions. So what’s the use of having many hash functions? You
can pick a hash randomly from a “good” family of hash functions. While this doesn’t seem so magical, it
has the informal property that it makes arbitrary data “random enough,” so that an algorithm which you
designed to work with truly random data will also work with the hashes of arbitrary data. Moreover, even
if an adversary knows \mathscr{H} and knows that you’re picking a hash function at random, there’s no
way for the adversary to manufacture problems by feeding bad data. With overwhelming probability the
worst-case scenario will not occur (Anon., n.d.).
Load balancing
The mathematical version of this problem usually goes with the metaphor of balls and bins. You have some
collection of m balls and n bins in which to put the balls, and you want to put the balls into the bins. But
there’s a twist: an adversary is throwing balls at you, and you have to put them into the bins before the next
ball comes, so you don’t have time to remember (or count) how many balls are in each bin already. You
only have time to do a small bit of mental arithmetic, sending ball i to bin f(i) where f is some simple
function. Moreover, whatever rule you pick for distributing the balls in the bins, the adversary knows it and
will throw balls at you in the worst order possible.
Hashing examples
1) In schools, the teacher assigns a unique roll number to each student. Later, the teacher uses that roll
number to retrieve information about that student.
2) A library has an infinite number of books. The librarian assigns a unique number to each book. This
unique number helps in identifying the position of the books on the bookshelf.
Load balancing examples
1) Workload Distribution Distribution of workloads to resources such as services, servers
or platforms. This is the core functionality provided by a load balancer and has several
common variations.
Autoscaling starting up and shouting down resources in response to demand condition. For
example , a cloud load balancer that starts new computing instances in response to peak traffic and
releases the instances when traffic subsides.
Because of the characteristics mentioned earlier, load balancers are highly beneficial to cloud
environments, where massive workloads can easily overwhelm a single server and high levels of service
availability and response times are critical to certain business processes or mandated by SLAs.
Load balancing also plays a key role in a cloud’s scalability. By nature, cloud infrastructures are supposed
to easily scale up to accommodate any uptick or surge in traffic. When a cloud “scales up”, it typically
spins up multiple virtual servers and runs multiple application instances. The main network component
responsible for distributing traffic across these new instances is/are the load balancer(s).
Without load balancers, newly spun virtual servers wouldn’t be able to receive the incoming traffic in a
coordinated fashion or if at all. Some virtual servers might even be left handling zero traffic while others
became overloaded.
Thus, if one region becomes inoperational due to a natural calamity like a catastrophic earthquake, flood,
or tsunami, load balancers can direct traffic to regions that haven’t been affected by the calamity.
Depending on the load balancing algorithms they support, load balancers may even be able to determine if
a certain server (or set of servers) is likely to get overloaded more quickly and redirect traffic to other
nodes that are deemed healthier. Proactive capabilities like this can significantly reduce the chances of
your cloud services becoming unavailable.
Hashing importance
1) Hashing gives a more secure and adjustable method of retrieving data compared to any other data
structure. It is quicker than searching for lists and arrays. In the very range, Hashing can recover data
in 1.5 probes, anything that is saved in a tree. Hashing, unlike other data structures, doesn’t define
the speed. A balance between time and space has to be maintained while hashing. There are two
ways of maintaining this balance.
a. Controlling speed by selecting the space to be allocated for the hash table
b. Controlling space by choosing a speed of recovery
2) Hashed passwords cannot be modified, stolen, or jeopardized. No well-recognized and efficient key
or encryption scheme exists that can be misused. Also, there is no need to worry if a hash code is
stolen since it cannot be applied anywhere else.
3) Two files can be compared for equality easily through hashing. There is no need to open the two
documents individually. Hashing compares them word-by-word and the computed hash value
instantly tells if they are distinct. This advantage can be used for verification of a file after it has been
shifted to a new place. It is an example of SyncBack which is a file backup program (Anon., n.d.).
1)
√ ( y−k ) + ( x −h )
2 2
= r
2 2
( y−k ) + ( x−h ) = r2
If center is ( 3 , -1 ) and a point on a circle is ( -2 , 1 )
r =√ ( 3 — (−2) ) + (−1−1 )2
2
= √ ( 5 )2 + (−2 )2
= √ 29
Then formula of the circle is:
( y + 1 )2 + ( x – 3 )2 = ¿)2
( y + 1 )2 + ( x – 3 )2 = 29
Y2 + x2 + 2y – 6x – 19 = 0
| pc | = r
Then let,,,
X2 + y2 + z2 – 6x + 2y + 8z - 4 = 0
X2 – 6x + y2 + 2y + z2 + 8z – 4 =0
( x – 3 )2 – 9 + (y + 1)2 – 1 + (z + 4)2 – 16 – 4 =0
( x – 3 )2 + (y – (-1))2 + (z – (-4))2 = ( √ 30)2
Figure 7 Parallelogram
Here
a = ( I + 3j – k ) ; b = ( 7i – 2j + 4k )
I j k
1 3 -1 10 I – 11 j – 23 k
7 -2 4
= 27. 39
1
Hence area of parallelogram = |a × b |
2
1
= × 27. 39
2
= 13. 695
Part 2
4)
Table is here
From ⓶
¿
Y = −3 ×2.5+10 ¿ 5
¿
Y = −7.5+10 ¿ 5
2.5
Y=
5
Y = ½ = 0.5
a = ( I + 4j – 2k )
b = ( 3i – 5j + k )
c = ( -4i + 3j + 6k )
1
Tetrahedron formula is ∨( a × b ) . c∨¿
6
(a×b)= I j k
1 4 -2
3 -5 1
= I (4 – 10 ) – j ( 1 + 6 ) + k (-5 – 12 )
= - 6 I – 7 j – 17 k
| ( a ×b ) .c | is ;
| ( - 6 I – 7 j – 17 k ) . ( -4i + 3j + 6k )|
= 24 + (-21) + (-102)
= 24 – 123
= -99
= | - 99 |
= 99
1
formula is ∨( a × b ) . c∨¿
6
= 99/6
= 16.5
D s(t) = 15t2 - 6t + 6
dt
velocity = 15t2 - 6t + 6
Part 2
3)
1 1
3 t2 + 5 t + 6
3 . 12 + 5 . 1 + 6
14 hundred trees
3 t2 + 5 t + 6
3 . 22 + 5 . 2 + 6
28 hundred trees
3 t2 + 5 t + 6
3 . 32 + 5 . 3 + 6
48 hundred trees
4
9000 ×
100
= 360 units
= 20 × 6.859 – 36 × 1.9
= 137.18 – 68.4
= 68.78
X=0 f'(x)=0
Inflection point at n = 0
f '' ( x ) =0
lim f ( x) = x5 ( 1 - 6 + 3 )
x→−∞ x2 x5
lim f ( x) = −∞
x→−∞
f ( x ) +∞ , x 3
f ( x ) −∞ , x -3
Figure 14 graph
table(Author developed)
So;
X = 0 or ( -16x2 + 6x + 10 ) = 0
-2 ( 8x2 – 3x – 5 ) = 0
8x2 – 3x – 5 =0
Then;
−(−3) ± √(−3) −4 ×8 ×(−5)
2
x=
2× 8
+3 ± √ 9+160
x=
16
3+13 3−13
X= or x =
16 16
−10 −5
X = 1 or x = =
16 8
So;
−5
X=1 , x= , x=0
8
X=1,f(x)=3 f'(x)=0
Local Maximum at ( 1 , 3 )
f '' ( x ) = -26 < 0
−5
x= , f'(x)=0
8 Local Maximum
f '' ( x ) = -1.25 < 0
x=0 f'(x)=0
Local Minimum
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 44 | P a g e
f '' ( x ) = 10 > 0
Table here
References
Anon., n.d. [Online]
Available at: https://www.quora.com/What-is-a-growth-factor-in-math