0% found this document useful (0 votes)
51 views21 pages

Computer Engineering Analysis and Techniques

The document outlines a computer engineering analysis assignment with multiple questions covering topics such as matrix manipulation, file I/O, plotting, loops, logic, and security. It includes sections on data modeling, curve fitting, and user-defined functions, along with a multiple-choice section on security concepts. Additionally, it features a question on creating a graphical user interface.

Uploaded by

australiapaper33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views21 pages

Computer Engineering Analysis and Techniques

The document outlines a computer engineering analysis assignment with multiple questions covering topics such as matrix manipulation, file I/O, plotting, loops, logic, and security. It includes sections on data modeling, curve fitting, and user-defined functions, along with a multiple-choice section on security concepts. Additionally, it features a question on creating a graphical user interface.

Uploaded by

australiapaper33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Computer engineering analysis

School of Affiliation

Instructor’s Name

Student’s Name

Date
Question 1 – Matrix manipulation

1.1

1.2

1.3
1.4

1.5

1.6
1.7

Question 2 – File I/O and plotting.

2.1

2.2
2.3

2.4

2.5
Question 3 – Writing data to file in a formatted manner

Question 4 – Loops and logic

4.1
4.2

43
4.4

Question 5 – Plotting 3D data and User-defined Functions

5.1

5.2
5.3
Question 6 – Basic curve-fitting and plotting.

6.1
6.2

The polynomial coefficients presents the second-order polynomial that models the

relationship between speed (in rpm) and power (in mW). The equation is:

DC_power = 0.1427.speed_rpm}^2 - 7.3472.speed_rpm + 287.8358

Power doubles when speed rises and the effect becomes larger with increasing speeds. As

speed drops the power decreases according to this pattern.

6.3
6.4
Question 7 – Readtable, logical indexing and user-defined functions

7.1
7.2

7.3

7.4
7.5

Question 8 – Security Questions Multi-choice

Question 8 – Security Questions Multi-choice [8 Marks]

8.1 Which of the following is a tool for protecting data in transit between devices?

C. Encryption

8.2 Which of the following, in isolation, is not classed as personal data?


D. Occupation

8.3 In the UK what is the legislation that covers the protection of a person’s private data?

B. Data Protection Act 2018

8.4 What is social engineering?

A. A method of extracting confidential information over the phone, through texts or e-mail.

8.5 Which of the following is not an example of malware?

D. Phishing

8.6 When developing and deploying code, which of the following is not true from a security

point of view?

C. Once secure code is deployed, no further testing should be undertaken on it.

8.7 Under the Computer Misuse Act 1990 which of the following is not an offence?

D. Viewing confidential data on a screen without having interacted with the computer.

8.8 Which of the following technologies are not used to protect data and computer assets?

D. Cookies
Question 9 – Creating a Graphical User Interface

You might also like