Computer engineering analysis
School of Affiliation
Instructor’s Name
Student’s Name
Date
Question 1 – Matrix manipulation
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Question 2 – File I/O and plotting.
2.1
2.2
2.3
2.4
2.5
Question 3 – Writing data to file in a formatted manner
Question 4 – Loops and logic
4.1
4.2
43
4.4
Question 5 – Plotting 3D data and User-defined Functions
5.1
5.2
5.3
Question 6 – Basic curve-fitting and plotting.
6.1
6.2
The polynomial coefficients presents the second-order polynomial that models the
relationship between speed (in rpm) and power (in mW). The equation is:
DC_power = 0.1427.speed_rpm}^2 - 7.3472.speed_rpm + 287.8358
Power doubles when speed rises and the effect becomes larger with increasing speeds. As
speed drops the power decreases according to this pattern.
6.3
6.4
Question 7 – Readtable, logical indexing and user-defined functions
7.1
7.2
7.3
7.4
7.5
Question 8 – Security Questions Multi-choice
Question 8 – Security Questions Multi-choice [8 Marks]
8.1 Which of the following is a tool for protecting data in transit between devices?
C. Encryption
8.2 Which of the following, in isolation, is not classed as personal data?
D. Occupation
8.3 In the UK what is the legislation that covers the protection of a person’s private data?
B. Data Protection Act 2018
8.4 What is social engineering?
A. A method of extracting confidential information over the phone, through texts or e-mail.
8.5 Which of the following is not an example of malware?
D. Phishing
8.6 When developing and deploying code, which of the following is not true from a security
point of view?
C. Once secure code is deployed, no further testing should be undertaken on it.
8.7 Under the Computer Misuse Act 1990 which of the following is not an offence?
D. Viewing confidential data on a screen without having interacted with the computer.
8.8 Which of the following technologies are not used to protect data and computer assets?
D. Cookies
Question 9 – Creating a Graphical User Interface