Let ?V be the set of vectors in ?2R2 with the following
definition of addition and scalar multiplication:
Addition: [?1?2]⊕[?1?2]=[0?2+?2][x1x2]⊕[y1y2]=[0x2+y2]
Scalar Multiplication: ?⊙[?1?2]=[0??2]α⊙[x1x2]=[0αx2]
Determine which of the Vector Space Axioms are satisfied.
A1. ?⊕?=?⊕?x⊕y=y⊕x for any ?x and ?y in ?V
? YES NO
A2. (?⊕?)⊕?=?⊕(?⊕?)(x⊕y)⊕z=x⊕(y⊕z) for any ?,?x,y and ?z in
?V
? YES NO
A3. There exists an element 00 in ?V such that ?⊕0=?x⊕0=x for
each ?∈?x∈V
? YES NO
A4. For each ?∈?x∈V, there exists an element −?−x in
?V such that ?⊕(−?)=0x⊕(−x)=0
? YES NO
A5. ?⊙(?⊕?)=(?⊙?)⊕(?⊙?)α⊙(x⊕y)=(α⊙x)⊕(α⊙y) for each
scalar ?α and any ?x and ?y ?V
? YES NO
A6. (?+?)⊙?=(?⊙?)⊕(?⊙?)(α+β)⊙x=(α⊙x)⊕(β⊙x) for any scalars ?α
and ?β and any ?∈?x∈V
? YES NO
A7. (??)⊙?=?⊙(?⊙?)(αβ)⊙x=α⊙(β⊙x) for any scalars ?α
and ?β and any ?∈?x∈V
? YES NO
A8. 1⊙?=?1⊙x=x for all ?∈?x∈V
? YES NO
In: Advanced Math
Below is a piece of an article which discusses one of thee many disputes which can come about when patients seek organ donation. it deals with a little girl named Sarah who desperately needed a double lung transplant but due to certain policies almost lost the opportunity to obtain it.
"Sarah’s family and the family of another cystic fibrosis patient at the same hospital challenged transplant policy that made children under 12 wait for pediatric lungs to become available or be offered lungs donated by adults only after adolescents and adults on the waiting list had been considered. They said pediatric lungs are rarely donated. The family challenged this policy and had Sarah placed on the adult donor list. Sarah’s aunt, Sharon Ruddock, said the donor lungs came in through normal channels as a result of being on the adult donor list. It was a direct result of the ruling that allowed her to be put on the adult list,” Ruddock said. “It was not pediatric lungs, she would have never gotten these lungs otherwise.” Before the ruling, Ruddock said, Sarah was “very close to the end. Maybe a week. Maybe two.”
You may read the full article at: http://www.nj.com/south/index.ssf/2013/06/philadelphia_girl_at_center_of.html
Students what do you think of policies such as the one above being in place which make children wait on another list separate from adults and adolescents giving them preference to organ donations?
In: Nursing
A database schema consisting of three relations STUDENT, COURSE, and STAFF is created as follows:
CREATE TABLE STUDENT (STU_ID CHAR(4),
STUDENT_NAME CHAR(20),
ADDRESS CHAR(20),
BIRTHDATE DATE,
GENDER CHAR(6));
CREATE TABLE COURSE (COURSE_ID CHAR(6),
COURSE_TITLE CHAR(20),
STAFF_ID CHAR(3),
SECTION NUMBER(2));
CREATE TABLE STAFF (STAFF_ID CHAR(3),
STAFF_NAME CHAR(20),
GENDER CHAR(6),
DEPARTMENT CHAR(20),
BOSS_ID CHAR(3)
SALARY NUMBER(8,2));
Write down SQL statement for each query below:
1) Find out the information of staff members who are female and earn either below $5,000 or above $30,000. [5 marks] 2) List all staff members who are not in the Accounting nor the History department. [5 marks] 3) List all students whose name contains the substring "JONES". List the females before the males in chronological order (by birthdate). [6 marks] 4) List all the courses taught by Raymond J. JOHNSON. [6 marks] 5) Find the names of all staff members who earn more than their bosses. [8 marks] 6) List all staff members who are either in the same department as Amy Dancer or Jack Nelson. [8 marks] 7) Find the names of the staff members who make more money than every member of the Accounting department. [7 marks] 8) Find the average salary for each department with more than one staff member. [5 marks]
In: Computer Science
a. Create a SLL for N Data by using front insertion.
b. Display the status of SLL and count the number of nodes in it
c. Perform Insertion and Deletion at End of SLL
d. Perform Insertion at the third position.
e. Delete the element at the Front of SLL
f. Perform Deletion at second position of SLL
g. Display the content.
Linked List (SLL) of Student Data with the fields: USN, Name, Branch, Sem, PhNo
a. Create a SLL of N Students Data by using front insertion.
b. Display the status of SLL and count the number of nodes in it
c. Perform Insertion and Deletion at End of SLL
d. Perform Insertion and Deletion at Front of SLL
e. Display the content.
a. Create a DLL for N Data by using front insertion.
b. Perform Insertion and Deletion at End of DLL
d. Perform Insertion at the third position.
e. Delete the element in the Front of SLL
f. Perform Deletion at second position of SLL
g. Display the content.
In: Computer Science
1(a) If ut − kuxx = f, vt − kvxx = g, f ≤ g, and u ≤ v at x = 0, x = l and t = 0, prove that u ≤ v for 0 ≤ x ≤ l, 0 ≤ t < ∞.
(b) If vt − vxx ≥ cos x for −π/2 ≤ x ≤ π/2, 0 < t < ∞, and if v(−π/2, t) ≥ 0, v(π/2, t) ≥ 0 and v(x, 0) ≥ cos x, use part (a) to show that v(x, t) ≥ (1 − e −t ) cos x.
In: Advanced Math
This question is in reference to BFS and DFS for data structures and algorithms
Consider a graph algorithm with a growth function on V and E: f(V, E). How would you convert f(V,E) to f'(V) such that f(V,E)=O(g(n))=f(V)? (That is, convert a growth function of two variables to be of one variable in such a way that the Big-Oh bound for the one variable function will hold for the two variable function.) Explain the steps in creating f', and explain why your idea works.
In: Computer Science
Let G be a connected graph and let e be a cut edge in G. Let K be the subgraph of G defined by:
V(K) = V(G) and
E(K) = E(G) - {e}
Prove that K has exactly two connected components. First prove that e cannot be a loop. Thus the endpoint set of e is of the form {v,w}, where v ≠ w. If ṽ∈V(K), prove that either there is a path in K from v to ṽ, or there is a path in K from w to ṽ
In: Advanced Math
Riipen Case Study The Situation:
Riipen’s mission is to end the very real social problem of
underemployment. Employment or income as the number 1 reason
students list for choosing to attend post-secondary has grown from
50% to 90% since the year 2000 (Source: New America). Disturbingly,
nearly 1/2 of university and college grads are underemployed in
North America (Source: Federal Reserve Bank of New York). We also
know now that if a recent graduate starts their careers
underemployed, they’re more likely to stay underemployed 5 years
(67% likely) and 10 years (50% likely) later (Source: Strada
Education, Burning Glass). Lack of relevant experience is listed as
one of the top three reasons why recent grads are rejected from the
candidate search. This means first jobs matter. We can no longer
rely on a recent graduates first job as the landing pad where they
gain the experience to launch their careers. Students need to gain
relevant experience throughout their degree to set themselves up
for success upon graduation and for the rest of their careers.
Riipen aims to solve this problem by bringing the relevant work
experience to students right in the classroom where it’s for course
credit and doesn’t require them to put off their graduation by
taking an internship or co-op. To date, Riipen has enabled 50,000
students at 150+ post-secondary institutions to partake in 1.5
million hours of applied learning with over 10,000 industry
partners. Beyond experience, students’ need a way of connecting to
the right potential employers and articulating their skills and
experience to increase their chance of finding relevant employment.
Currently, Riipen solves this challenge by offering a student
portfolio where students can collect skill verifications, written
recommendations and now even badges for their work that they can
market to employers in their network to increase their chances of
being hired. Now that we’ve built up global talent pool of
industry-vetted student profiles, our organizations want the
ability to search through the data base and invite students that
have chosen to opt in to gain access to exclusive job opportunities
only available to students the can demonstrate experience and
skills through Riipen projects. The goal is to a) increase the
number of channels that students and employers can connect to make
better employment matches b) to increase revenue streams so that
Riipen can invest in growing the student, employer, educator,
ecosystem and increase access to project-based learning and better
employment outcomes for students/companies.
The Ethical Dilemma:
As seen in the scenarios included in the link below, Riipen is
debating whether to charge more for this service (let’s call it
“Riipen.Recruiter” [play off of linkedin recruiter]) and increase
revenue which in turn would allow Riipen to reach more students but
may reduce the % of students that get hired through the app in the
short term or whether to charge less for the Riipen.Recruiter so
that more companies can access and a higher % of students using the
platform get hired, however, growth is delayed and Riipen reaches
fewer students in the longterm.
Questions:
In: Operations Management
Software Engineering Course
Directions: Read the Initial System Requests below and than answer the identify actors and identify use cases questions.
Initial System Requests
Wylie College is planning to develop a new online Course Registration System. The new Web-enabled system replaces its much older system developed around mainframe technology. The new system allows students to register for courses from any Internet browser. Professors use the system to register to teach courses and to record grades.
Because of a decrease in federal funding, the college cannot afford to replace the entire system at once. The college will keep the existing course catalog database where all course information is maintained. This database is an Ingres relational database running on a DEC VAX. The legacy system performance is poor, so the new system accesses course information from the legacy database but does not update it. The registrar’s office continues to maintain course information through another system.
Students can request a printed course catalog containing a list of course offerings for the semester. Students can also obtain the course information online at any time. Information about each course, such as professor, department, credit hours, and prerequisites assists students in making informed decisions.
The new system allows students to select four course offerings for the coming semester. In addition, each student indicates two alternate choices in case the student cannot be assigned to a primary selection. Courses have a maximum of ten and a minimum of three students.
The registration process closes on the first or second day of classes for the semester. Any course with fewer than three students enrolled on the day registration closes is cancelled. All courses without an instructor on the day registration closes are cancelled. Students enrolled in cancelled classes are notified that the course has been cancelled, and the course is removed from their schedules. The registration system sends information about all student enrollments to the Billing System so that the students can be billed for the semester.
For the first two weeks of the semester, students are allowed to alter their course schedules. Students may access the online system during this time to add or drop courses. Changes in schedules are immediately sent to the Billing System so that an updated bill can be sent to the student.
At the end of the semester, the student can access the system to view an electronic report card. Since student grades are sensitive information, the system must employ security measures to prevent unauthorized access. All students, professors, and administrators have their own identification codes and passwords.
Professors must be able to access the online system to indicate which courses they want to teach. They also need to see which students signed up for their course offerings. In addition, professors can record the grades for the students in each class.
Identify Actors
Who uses the system?
Who gets information from the system?
Who provides information to the system?
Where in the organization is the system used?
Who supports and maintains the system?
What other systems use this system?
Identify Use Cases
What are the goals of each actor?
Does the system supply the business with all of the correct behavior?
In: Computer Science
Java Language
Add a recursive method to the program shown in the previous section that states how many nodes does the stack have.
Code:
class Stack {
protected Node top;
Stack() {
top = null; }
boolean isEmpty() {
return( top == null); }
void push(int v) {
Node tempPointer;
tempPointer = new Node(v);
tempPointer.nextNode = top;
top = tempPointer; }
int pop() {
int tempValue;
tempValue = top.value;
top = top.nextNode;
return tempValue; }
void printStack() {
Node aPointer = top;
String tempString = "";
while (aPointer != null) {
tempString = tempString + aPointer.value + "\n";
aPointer = aPointer.nextNode; }
System.out.println(tempString); }
boolean hasValue(int v) {
if (top.value == v) {
return true; }
else {
return hasValueSubList(top,v);
}
}
boolean hasValueSubList(Node ptr, int v) {
if (ptr.nextNode == null) {
return false; }
else if (ptr.nextNode.value == v) {
return true; }
else {
return hasValueSubList(ptr.nextNode,v);
}
}
}
class Node {
int value;
Node nextNode;
Node(int v, Node n) {
value = v;
nextNode = n;
}
Node (int v) {
this(v,null);
}
}
public class StackWithLinkedList2{
public static void main(String[] args){
int popValue;
Stack myStack = new Stack();
myStack.push(5);
myStack.push(7);
myStack.push(9);
System.out.println(myStack.hasValue(11));
}
}
System.out.println(myStack.hasValue(11));
}
}
In: Computer Science