2.10-2. Consider the system described by
x(k + 1) = c
0 1
0 3
d x(k) + c
1
1
d u(k)
y(k) = [-2 1]x(k)
(a) Find the transfer function Y(z)/U(z).
(b) Using any similarity transformation, find a different state
model for this system.
(c) Find the transfer function of the system from the transformed
state equations.
(d) Verify that A given and Aw derived in part (b) satisfy the
first three properties of similarity transformations.
The fourth property was verified in part (c).
In: Computer Science
Discuss how you can create an effective website that will attract your customers. Give some features of this website. (Assume that you have a company of your own and state what company is this.)
In: Computer Science
Choose a Topic for a Dissertation in Cyber Security in 2020
Create a 750-word document that includes the following:
In: Computer Science
In: Computer Science
In: Computer Science
Ikea is a values-driven company with a passion for life at home. According to them every product they create is their idea for making home a better place. At the IKEA, they have 389 stores worldwide. Their vision is “To create a better everyday life for many people”. Their business idea is “to offer a wide range of well-designed, functional home furnishing products at prices so low that as many people as possible will be able to afford them”.
Q. Identify 2-3user interface requirements of
IKEA.
3. External Interface Requirements
3.1 User Interfaces
<Describe the logical characteristics of each interface between
the software product and the users. This may include sample screen
images, any GUI standards or product family style guides that are
to be followed, screen layout constraints, standard buttons and
functions (e.g., help) that will appear on every screen, keyboard
shortcuts, error message display standards, and so on. Define the
software components for which a user interface is needed. Details
of the user interface design should be documented in a separate
user interface specification.>
3.2 Hardware Interfaces
<Describe the logical and physical characteristics of each
interface between the software product and the hardware components
of the system. This may include the supported device types, the
nature of the data and control interactions between the software
and the hardware, and communication protocols to be used.>
3.3 Software Interfaces
<Describe the connections between this product and other
specific software components (name and version), including
databases, operating systems, tools, libraries, and integrated
commercial components. Identify the data items or messages coming
into the system and going out and describe the purpose of each.
Describe the services needed and the nature of communications.
Refer to documents that describe detailed application programming
interface protocols. Identify data that will be shared across
software components. If the data sharing mechanism must be
implemented in a specific way (for example, use of a global data
area in a multitasking operating system), specify this as an
implementation constraint.>
3.4 Communications Interfaces
<Describe the requirements associated with any communications
functions required by this product, including e-mail, web browser,
network server communications protocols, electronic forms, and so
on. Define any pertinent message formatting. Identify any
communication standards that will be used, such as FTP or HTTP.
Specify any communication security or encryption issues, data
transfer rates, and synchronization mechanisms.>
In: Computer Science
Which of the following will give you a sum of numbers equal to 15
| 1. |
s = 0 |
|
| 2. |
All of the above. |
|
| 3. |
sum(list((9,5,1))) |
|
| 4. |
None of the above. |
|
| 5. |
s = 0 |
In: Computer Science
In: Computer Science
In: Computer Science
Please explain the best practices for creating backups in Windows, Linux, and Mac OS X in a paragraph or two.
In: Computer Science
On SQL explain Views, Union All, Union, Truncate, Delete. And how we create Accounts in SQL Server?
In: Computer Science
Please discuss in a paragraph or two about the organizations and companies that utilize private cloud services rather than public cloud services. Discuss the reasons for doing so and possible benefits.
In: Computer Science
May I get the output screenshot for the following source code:
INCLUDE Irvine32.inc
MAX_VALUE = 100
.data
str1 BYTE "Enter The character that want to display on Screen:
",0
char BYTE ?
rows BYTE ?
cols BYTE ?
randrow BYTE ?
randcol BYTE ?
.code
main PROC
mov edx, OFFSET str1
call writeString
call ReadChar
mov char, al
call crlf
call WriteChar
call crlf
mov eax,0
mov ebx,0
mov ecx,0
mov edx,0
call crlf
call GetMaxXY
mov rows,dh
mov cols,dl
call crlf
call crlf
mov eax,0
mov ebx,0
mov ecx,0
mov edx,0
;
mov ecx,MAX_VALUE ;counter
L1:
movzx eax,rows
call RandomRange
mov randrow, al
;call WriteDec
call crlf
mov eax,0
movzx eax,cols
call RandomRange
mov randcol, al
;call WriteDec
call crlf
mov eax,0
mov ebx,0
mov edx,0
mov dh,randrow
mov dl,randcol
call Gotoxy
movzx eax,char
call WriteChar
call crlf
mov eax,0
loop L1
exit
;exiting main.
main ENDP
END main
In: Computer Science
Develop a set of test cases for the algorithm In a scheduling program, we want to check whether two appointments overlap. For simplicity, appointments start at a full hour, and we use military time (with hours 0–24). The following pseudocode describes an algorithm that determines whether the appointment with start time start1 and end time end1 overlaps with the appointment with start time start2 and end time end2.
If start1 > start2
s = start1
Else s = start2
If end1 < end2
e = endl
Else e = end2
If s < e
The appointments overlap.
Else The appointments don’t overlap.
Trace this algorithm with an appointment from 10–12 and one from 11–13, then with an appointment from 10–11 and one from 12–13.
In: Computer Science
(C LANGUAGE) Write a function called upperLower that inputs a line of text into char array s[100]. Output the line in uppercase letters and in lowercase letters
This is what I have so far:
void * upperLower (const char * s) {
char *word[sizeof(s)];
for(int i = 0; i < sizeof(s); i++){
*word[i] = s[i];
}
word = strtok(word, " ");
int counter = 0;
while(word != NULL){
if(counter % 2 == 0){
word[counter] = toupper(word);
printf("%s ", word);
}
else{
word[counter] = tolower(word);
printf("%s ", word);
}
counter++;
word = strtok(NULL, " ");
}
}
The method cannot be changed. Must use void * upperLower (const char * s) {
The output should be like THIS is A test
In: Computer Science