Questions
Let ?V be the set of vectors in ?2R2 with the following definition of addition and...

Let ?V be the set of vectors in ?2R2 with the following definition of addition and scalar multiplication:
Addition: [?1?2]⊕[?1?2]=[0?2+?2][x1x2]⊕[y1y2]=[0x2+y2]
Scalar Multiplication: ?⊙[?1?2]=[0??2]α⊙[x1x2]=[0αx2]
Determine which of the Vector Space Axioms are satisfied.

A1. ?⊕?=?⊕?x⊕y=y⊕x for any ?x and ?y in ?V
? YES NO

A2. (?⊕?)⊕?=?⊕(?⊕?)(x⊕y)⊕z=x⊕(y⊕z) for any ?,?x,y and ?z in ?V
? YES NO

A3. There exists an element 00 in ?V such that ?⊕0=?x⊕0=x for each ?∈?x∈V
? YES NO

A4. For each ?∈?x∈V, there exists an element  −?−x in ?V such that ?⊕(−?)=0x⊕(−x)=0
? YES NO

A5.  ?⊙(?⊕?)=(?⊙?)⊕(?⊙?)α⊙(x⊕y)=(α⊙x)⊕(α⊙y) for each scalar ?α and any ?x and ?y ?V
? YES NO

A6. (?+?)⊙?=(?⊙?)⊕(?⊙?)(α+β)⊙x=(α⊙x)⊕(β⊙x) for any scalars ?α and  ?β and any ?∈?x∈V
? YES NO

A7. (??)⊙?=?⊙(?⊙?)(αβ)⊙x=α⊙(β⊙x) for any scalars ?α and  ?β and any ?∈?x∈V
? YES NO

A8. 1⊙?=?1⊙x=x for all ?∈?x∈V
? YES NO

In: Advanced Math

Below is a piece of an article which discusses one of thee many disputes which can...

Below is a piece of an article which discusses one of thee many disputes which can come about when patients seek organ donation. it deals with a little girl named Sarah who desperately needed a double lung transplant but due to certain policies almost lost the opportunity to obtain it.

"Sarah’s family and the family of another cystic fibrosis patient at the same hospital challenged transplant policy that made children under 12 wait for pediatric lungs to become available or be offered lungs donated by adults only after adolescents and adults on the waiting list had been considered. They said pediatric lungs are rarely donated. The family challenged this policy and had Sarah placed on the adult donor list. Sarah’s aunt, Sharon Ruddock, said the donor lungs came in through normal channels as a result of being on the adult donor list. It was a direct result of the ruling that allowed her to be put on the adult list,” Ruddock said. “It was not pediatric lungs, she would have never gotten these lungs otherwise.” Before the ruling, Ruddock said, Sarah was “very close to the end. Maybe a week. Maybe two.”

You may read the full article at: http://www.nj.com/south/index.ssf/2013/06/philadelphia_girl_at_center_of.html

Students what do you think of policies such as the one above being in place which make children wait on another list separate from adults and adolescents giving them preference to organ donations?

In: Nursing

A database schema consisting of three relations STUDENT, COURSE, and STAFF is created as follows: CREATE...

A database schema consisting of three relations STUDENT, COURSE, and STAFF is created as follows:

CREATE TABLE STUDENT (STU_ID CHAR(4),

STUDENT_NAME CHAR(20),

ADDRESS CHAR(20),

BIRTHDATE DATE,

GENDER CHAR(6));

CREATE TABLE COURSE (COURSE_ID CHAR(6),

COURSE_TITLE CHAR(20),

STAFF_ID CHAR(3),

SECTION NUMBER(2));

CREATE TABLE STAFF (STAFF_ID CHAR(3),

STAFF_NAME CHAR(20),

GENDER CHAR(6),

DEPARTMENT CHAR(20),

BOSS_ID CHAR(3)

SALARY NUMBER(8,2));

Write down SQL statement for each query below:

1) Find out the information of staff members who are female and earn either below $5,000 or above $30,000. [5 marks] 2) List all staff members who are not in the Accounting nor the History department. [5 marks] 3) List all students whose name contains the substring "JONES". List the females before the males in chronological order (by birthdate). [6 marks] 4) List all the courses taught by Raymond J. JOHNSON. [6 marks] 5) Find the names of all staff members who earn more than their bosses. [8 marks] 6) List all staff members who are either in the same department as Amy Dancer or Jack Nelson. [8 marks] 7) Find the names of the staff members who make more money than every member of the Accounting department. [7 marks] 8) Find the average salary for each department with more than one staff member. [5 marks]

In: Computer Science

Design, Develop and Implement the following operations on Singly Linked List (SLL) with a single field...

  1. Design, Develop and Implement the following operations on Singly Linked List (SLL) with a single field data

a.   Create a SLL for N Data by using front insertion.

b.   Display the status of SLL and count the number of nodes in it

c.   Perform Insertion and Deletion at End of SLL

d.   Perform Insertion at the third position.

e.    Delete the element at the Front of SLL

f.     Perform Deletion at second position of SLL

g.     Display the content.

  1. Design, Develop and Implement a menu driven Program in Java for the following operations on Singly

Linked List (SLL) of Student Data with the fields: USN, Name, Branch, Sem, PhNo

a.   Create a SLL of N Students Data by using front insertion.

b.   Display the status of SLL and count the number of nodes in it

c.   Perform Insertion and Deletion at End of SLL

d.   Perform Insertion and Deletion at Front of SLL

e.     Display the content.

  1. Design, Develop and Implement a Singly Linked List (SLL) with a single string field name using the class Linked List
  1. Create a SLL for N Data by using front insertion
  2. Insert an element at position first, 3 and last.
  3. Delete an element from first, 3 and last.
  4. Display the content

  1. Design, Develop and Implement a Circular Linked List (CLL) with a single field data
    1. Create a CLL for N Data by using front insertion
    2. Display the content.

  1. Design, Develop and Implement a Doubly Linked List (DLL) with a single field data

a.    Create a DLL for N Data by using front insertion.

b.   Perform Insertion and Deletion at End of DLL

d.   Perform Insertion at the third position.

e.     Delete the element in the Front of SLL

f.     Perform Deletion at second position of SLL

g.     Display the content.

In: Computer Science

1(a) If ut − kuxx = f, vt − kvxx = g, f ≤ g, and...

1(a) If ut − kuxx = f, vt − kvxx = g, f ≤ g, and u ≤ v at x = 0, x = l and t = 0, prove that u ≤ v for 0 ≤ x ≤ l, 0 ≤ t < ∞.

(b) If vt − vxx ≥ cos x for −π/2 ≤ x ≤ π/2, 0 < t < ∞, and if v(−π/2, t) ≥ 0, v(π/2, t) ≥ 0 and v(x, 0) ≥ cos x, use part (a) to show that v(x, t) ≥ (1 − e −t ) cos x.

In: Advanced Math

This question is in reference to BFS and DFS for data structures and algorithms Consider a...

This question is in reference to BFS and DFS for data structures and algorithms

Consider a graph algorithm with a growth function on V and E: f(V, E). How would you convert f(V,E) to f'(V) such that f(V,E)=O(g(n))=f(V)? (That is, convert a growth function of two variables to be of one variable in such a way that the Big-Oh bound for the one variable function will hold for the two variable function.) Explain the steps in creating f', and explain why your idea works.

In: Computer Science

Let G be a connected graph and let e be a cut edge in G. Let...

Let G be a connected graph and let e be a cut edge in G. Let K be the subgraph of G defined by:

V(K) = V(G) and

E(K) = E(G) - {e}

Prove that K has exactly two connected components. First prove that e cannot be a loop. Thus the endpoint set of e is of the form {v,w}, where v ≠ w. If ṽ∈V(K), prove that either there is a path in K from v to ṽ, or there is a path in K from w to ṽ

In: Advanced Math

Riipen Case Study The Situation: Riipen’s mission is to end the very real social problem of...

Riipen Case Study The Situation:

Riipen’s mission is to end the very real social problem of underemployment. Employment or income as the number 1 reason students list for choosing to attend post-secondary has grown from 50% to 90% since the year 2000 (Source: New America). Disturbingly, nearly 1/2 of university and college grads are underemployed in North America (Source: Federal Reserve Bank of New York). We also know now that if a recent graduate starts their careers underemployed, they’re more likely to stay underemployed 5 years (67% likely) and 10 years (50% likely) later (Source: Strada Education, Burning Glass). Lack of relevant experience is listed as one of the top three reasons why recent grads are rejected from the candidate search. This means first jobs matter. We can no longer rely on a recent graduates first job as the landing pad where they gain the experience to launch their careers. Students need to gain relevant experience throughout their degree to set themselves up for success upon graduation and for the rest of their careers. Riipen aims to solve this problem by bringing the relevant work experience to students right in the classroom where it’s for course credit and doesn’t require them to put off their graduation by taking an internship or co-op. To date, Riipen has enabled 50,000 students at 150+ post-secondary institutions to partake in 1.5 million hours of applied learning with over 10,000 industry partners. Beyond experience, students’ need a way of connecting to the right potential employers and articulating their skills and experience to increase their chance of finding relevant employment. Currently, Riipen solves this challenge by offering a student portfolio where students can collect skill verifications, written recommendations and now even badges for their work that they can market to employers in their network to increase their chances of being hired. Now that we’ve built up global talent pool of industry-vetted student profiles, our organizations want the ability to search through the data base and invite students that have chosen to opt in to gain access to exclusive job opportunities only available to students the can demonstrate experience and skills through Riipen projects. The goal is to a) increase the number of channels that students and employers can connect to make better employment matches b) to increase revenue streams so that Riipen can invest in growing the student, employer, educator, ecosystem and increase access to project-based learning and better employment outcomes for students/companies.

The Ethical Dilemma:

As seen in the scenarios included in the link below, Riipen is debating whether to charge more for this service (let’s call it “Riipen.Recruiter” [play off of linkedin recruiter]) and increase revenue which in turn would allow Riipen to reach more students but may reduce the % of students that get hired through the app in the short term or whether to charge less for the Riipen.Recruiter so that more companies can access and a higher % of students using the platform get hired, however, growth is delayed and Riipen reaches fewer students in the longterm.

Questions:

  1. What are the moral roots of the company?  
  • What were Riipen’s values at its inception?
  • How has Riipen’s values evolved since its inception?
  • If the values changed discuss what caused the change?
  • In the early stages of Riipen business what competing values did the organization have that informed their actions regarding dealing with clients and their funding source?
  • Identify the Institution’s competing values that have led to its difficulties in addressing the current problem.

In: Operations Management

Software Engineering Course Directions: Read the Initial System Requests below and than answer the identify actors...

Software Engineering Course

Directions: Read the Initial System Requests below and than answer the identify actors and identify use cases questions.

Initial System Requests

Wylie College is planning to develop a new online Course Registration System. The new Web-enabled system replaces its much older system developed around mainframe technology. The new system allows students to register for courses from any Internet browser. Professors use the system to register to teach courses and to record grades.

Because of a decrease in federal funding, the college cannot afford to replace the entire system at once. The college will keep the existing course catalog database where all course information is maintained. This database is an Ingres relational database running on a DEC VAX. The legacy system performance is poor, so the new system accesses course information from the legacy database but does not update it. The registrar’s office continues to maintain course information through another system.

Students can request a printed course catalog containing a list of course offerings for the semester. Students can also obtain the course information online at any time. Information about each course, such as professor, department, credit hours, and prerequisites assists students in making informed decisions.

The new system allows students to select four course offerings for the coming semester. In addition, each student indicates two alternate choices in case the student cannot be assigned to a primary selection. Courses have a maximum of ten and a minimum of three students.

The registration process closes on the first or second day of classes for the semester. Any course with fewer than three students enrolled on the day registration closes is cancelled. All courses without an instructor on the day registration closes are cancelled. Students enrolled in cancelled classes are notified that the course has been cancelled, and the course is removed from their schedules. The registration system sends information about all student enrollments to the Billing System so that the students can be billed for the semester.

For the first two weeks of the semester, students are allowed to alter their course schedules. Students may access the online system during this time to add or drop courses. Changes in schedules are immediately sent to the Billing System so that an updated bill can be sent to the student.

At the end of the semester, the student can access the system to view an electronic report card. Since student grades are sensitive information, the system must employ security measures to prevent unauthorized access. All students, professors, and administrators have their own identification codes and passwords.

Professors must be able to access the online system to indicate which courses they want to teach. They also need to see which students signed up for their course offerings. In addition, professors can record the grades for the students in each class.

Identify Actors

Who uses the system?                                                             

Who gets information from the system?                              

Who provides information to the system?                          

Where in the organization is the system used?                  

Who supports and maintains the system?                           

What other systems use this system?                                   

Identify Use Cases

What are the goals of each actor?

  • What will the actor use the system for?
  • Will the actor create, store, change, remove, or read data in the system?
  • Will the actor need to inform the system about external events or changes?
  • Will the actor need to be informed about certain occurrences in the system?

Does the system supply the business with all of the correct behavior?

In: Computer Science

Java Language Add a recursive method to the program shown in the previous section that states...

Java Language

Add a recursive method to the program shown in the previous section that states
how many nodes does the stack have.

Code:

class Stack {

protected Node top;

Stack() {

top = null; }

boolean isEmpty() {

return( top == null); }

void push(int v) {

Node tempPointer;

tempPointer = new Node(v);

tempPointer.nextNode = top;

top = tempPointer; }

int pop() {

int tempValue;

tempValue = top.value;

top = top.nextNode;

return tempValue; }

void printStack() {

Node aPointer = top;

String tempString = "";

while (aPointer != null) {

tempString = tempString + aPointer.value + "\n";

aPointer = aPointer.nextNode; }

System.out.println(tempString); }

boolean hasValue(int v) {

if (top.value == v) {

return true; }

else {

return hasValueSubList(top,v);

}

}

boolean hasValueSubList(Node ptr, int v) {

if (ptr.nextNode == null) {

return false; }

else if (ptr.nextNode.value == v) {

return true; }

else {

return hasValueSubList(ptr.nextNode,v);

}

}

}

class Node {

int value;

Node nextNode;

Node(int v, Node n) {

value = v;

nextNode = n;

}

Node (int v) {

this(v,null);

}

}

public class StackWithLinkedList2{

public static void main(String[] args){

int popValue;

Stack myStack = new Stack();

myStack.push(5);

myStack.push(7);

myStack.push(9);

System.out.println(myStack.hasValue(11));

}

}

System.out.println(myStack.hasValue(11));

}

}

In: Computer Science