# Computer Methods - Math Problem Example

Summary
Above Venn diagram is made on the base of intersection between three sets, P, Q, R for example "3" is the intersection of all three sets so its is written on the place where all three circle representing the sets, intersect. Similarly "4" and "5" are intersection of sets P, Q and the sets Q,R respectively so these elements are written where this intersection point occurs…

## Extract of sample "Computer Methods"

Download file to see previous pages S' will be computed by finding T - S, so
S' = { (1, 1), (2, 1), (2, 2) }
Question 2
1. a) Using the following propositions
h: it is humid
c: it is cloudy
and d: it is raining
express the following logical expressions in good English.
i) (hc)r
ii) (rh)c
b) Assuming and S is a set of lectures and the and the predicates
L(x): x is a lecturer
and A(x): x is articulate
write the following sentences in symbolic form
i) Larry is an articulate lecturer.
ii) There is a lecturer who is not articulate.
iii) Not every lecturer is articulate.
What is the relationship between predicates (ii) and (iii)
c) Determine the truth table for (pq)(pq)
State whether this expression is contingency, a contradiction or a tautology.
Solution
a)
i) (hc)r

the atmosphere is humid cloudy and it is not raining
ii) (rh)c

if atmosphere is raining or humid then atmosphere is cloudy.

b)
(i) Larry is an articulate lecturer.
L(Larry) A(Larry)
(ii) There is a lecturer who is not articulate.
To solve this we will use the concept of universal quantifiers \$(x)
Which means that a statement is true for all values of x. Now the statement in symbolic form is:
"(x)[L(x) 'A(x)]'
Which means that "it is not true that all the lecturers are articulate". So in this sense this predicate describes that "there are some lecturers who are not articulate"

(iii) Not every lecturer is articulate.
"(x)[L(x) 'A(x)]'
The relationship between last two predicates is that these define same thing i.e. "Not every lecturer is articulate" does not ever means that " All the lecturer are not articulate" it could mean...
And all the points that are not common in any set are placed in circles where no intersection is occurring.
The relationship between last two predicates is that these define same thing i.e. "Not every lecturer is articulate" does not ever means that " All the lecturer are not articulate" it could mean that "There are some lecturers who are not articulate" so we can not use universal quantifiers for this predicate hence it means that "Not every lecture is articulate but there are some that can be articulate" so in this sense of interpretation last two predicates are same. ...Download file to see next pagesRead More
Cite this document
• APA
• MLA
• CHICAGO
(“Computer Methods Math Problem Example | Topics and Well Written Essays - 1000 words”, n.d.)
(Computer Methods Math Problem Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/science/1531132-computer-methods.
“Computer Methods Math Problem Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/science/1531132-computer-methods.
Click to create a comment or rate a document

## CHECK THESE SAMPLES OF Computer Methods

### Apply design guidelines to human-computer interaction methods

...?Apply Design Guidelines to Human-Computer Interaction Methods Apply Design Guidelines to Human-Computer Interaction Methods Websitedesign often engulfs series of different skills and disciples towards designing, developing, and maintaining of the website (Heim, 2008). The main areas of website design include interface design, graphic design, user experience design, search engine optimization, and authority. Notably, the authority design has features including property software and code. The main purpose of the web design aims at meeting or solving the need in the front end the client side; thus, the main feature in this web design is the writing make up that will update...
3 Pages(750 words)Essay

### Apply Design Guidelines to Human-Computer Interaction Methods

...﻿Apply Design Guidelines to Human-Computer Interaction Methods (Part 3) Introduction In unit five, my essay outlined the creation and development of the website or the website designing techniques. Website design often engulfs series of different skills and disciples of designing, development, and maintenance of the website (Heim, 2008). The main areas of website design include interface design, graphic design, user experience design, search engine optimization, and authority. Commentary Text Texts are quite essential elements in the design since they facilitate interaction between the user and the computer. Notably, there are different contextual information with different and varied goals and objectives. The information herein... will be...
3 Pages(750 words)Essay

### Computer Network Security Methods

...Running head: A CRITICAL ANALYSIS OF COMPUTER NETWORK SECURITY METHODS A Critical Analysis of Computer Network Security Methods ------------------------------------- Abstract The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks. All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally... , an...
24 Pages(6000 words)Essay

### Computer Methods

...Manchester Metropolitan Department of Computing and Mathematics MA1261 Computing Methods: Test Revision P, Q and R are the sets P = {1, 2, 3, 4}, Q = {3, 4, 5, 6} and R = {3, 5, 7, 9}. a) Draw the Venn diagram containing P, Q and R. [4] b) List the elements in the sets P - (Q'R) and (P - Q)'(P - R). Are these two sets equal' Justify your answer. [6] c) List the elements in T = X ''Y when X = P - Q and Y = P - R. Assuming T is the universal set and S = {(x, y), x
5 Pages(1250 words)Assignment

### Computer

...After reading Josh Coates’ article “Internet storage boosts Web sites”, I probably would not choose Internet storage for my digital pictures. Since I am an AOL user, I have enough storage (unlimited email storage) to save my vacation pictures in emails. I would attach my digital photos onto one, two, or as many emails as it took, and then I would email them to myself. I would then save my emails online. This would allow me to access my digital photos from any computer connected to the Internet. Even if my computer crashed, I would still have my vacation photos. The main reason I would not save my digital photos on Internet storage after reading Coates’ article is the inference Internet storage can be...
2 Pages(500 words)Essay

### Computer

...Reflective Assignment Insert Reflective Assignment Essay Reflection on Bad Design It is clear that this essay met its objective in the sense that, it is precise and on point. The essay dwells on the concept of bad design. There are several reasons that bring about the conclusion that the essay met its required objectives. To begin with, there is no way one can issue a statement or discussion about bad design and fail to provide an example of a sample image (Ursula 2007). The fact that this essay contains a depiction of some sort of a switch clearly implies that the objective of describing a bad design has been met. According to the essay, the concept of technology had to come out clearly through sharing the image... Assignment Insert...
4 Pages(1000 words)Assignment

### Computer

...be able to delegate employees to run the system while blackboard was found to be appropriate for the institutions that had the money to buy the best learning system. The institution customized learning system required the institution to create the learning system from scratch but it was also a costly venture but it would cater for the system needs since it was tailored specifically for the system. In conclusion it was found that virtual learning systems are now very important in learning institutions, for it operate smoothly and to prevent the cumbersome old traditional methods that used to give instructors and students a hard time. Introduction Santiago et al (2007) enumerates that various studies have shown that...
6 Pages(1500 words)Assignment

### Computer

...Dell Inspiron 15R laptop A picture of Dell Inspiron 15R laptop as shown in the dell website, www.dell.com The Dell Inc. Computer Technology company provides a variety of computers. Among their products include the Dell Inspiron 15R laptop. This is a smooth laptop which is 17 percent thinner than preceding generations. The laptop is unique in nature since it offers the features of both mid-range and mid-sized computers, it is also flexible and is very efficient for operators who do not need neither a technical powerhouse nor a computer that withholds on the normal basic features. Also to mention, Dell Inspiron 15R laptop stands out from other machines in that in addition...
2 Pages(500 words)Essay

### Discussion Week 7 Question 1 Comparing Graphical and Computer-Based Methods

...Comparing Graphical and Computer-Based Methods al Affiliation Comparing Graphical and Computer-Based Methods What does the shadow price reflect in a maximization problem? Please explain. The shadow price, in a maximization problem with an identified objective constraint, reportedly reflects “the amount that the objective function of the maximization would increase by if the constraint were relaxed by one unit” (Beggs, 2014, par. 1). This was corroborated by Spivey (2011) who expounded the concept of shadow price in a maximization problem, to wit: “For maximization problems like this one the constraints can often be thought of as restrictions on the amount of resources available, and the objective can be thought of as profit... . Then the...
2 Pages(500 words)Assignment

### Computer

...COMPUTER SCIENCE SECTION A How to represent data A digital computer is created to process data. The circuits conduct mathematical operations that include division, multiplication, subtraction and addition. The numbers that are used in a digital computer are expressed in bits of binary digits and these include zero and one, zero, one, ten eleven, one hundred and so on. The binary digits can be defined in the circuitry of the computer by a current presence or absence of a voltage. A sequence of eight successive digits is referred to as byte, which can authorize 256 combinations (Knuth, 2003, p.67). Every bite can indicate 256 alphanumeric oddities referred to as SBCS....
6 Pages(1500 words)Coursework
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

## Let us find you another Math Problem on topic Computer Methods for FREE!

This Website is owned and operated by Studentshare Ltd (HE364715) , having its registered office at Aglantzias , 21, COMPLEX 21B, Floor 2, Flat/Office 1, Aglantzia , Cyprus.
• FAQ
• Blog
• New Essays
• Essays
• Miscellaneous