Professional Documents
Culture Documents
A 019730 1636101756198 114163 W.M.supun Anjana Jayasinghe Unit 11 - Maths For Computing - Reworded - 2021
A 019730 1636101756198 114163 W.M.supun Anjana Jayasinghe Unit 11 - Maths For Computing - Reworded - 2021
Student Name/ID
Unit Title Unit 11 : Maths for Computing
LO3 Determine solutions of graphical examples using geometry and vector methods.
Pass, Merit & P5 P6 M3 D3
Distinction Descripts
LO4 Evaluate problems concerning differential and integral calculus.
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately
filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work and to
present it as my own without attributing the sources in the correct way. I further understand
what it means to copy another’s work.
Action Plan
Summative feedback
Assessor’s
Date
Signature
Assignment Brief
Unit Tutor
Issue Date
Submission Date
Submission Format:
This assignment should be submitted at the end of your lesson, on the week stated at the front of this
brief. The assignment can either be word-processed or completed in legible handwriting.
If the tasks are completed over multiple pages, ensure that your name and student number are present on
each sheet of paper.
Part 1
1. A tailor wants to make square shaped towels. The required squared pieces of cloth will
be cut from a ream of cloth which is 20 meters in length and 16 meters in width.
a) Find the minimum number of squared pieces that can be cut from the ream of cloth
without wasting any cloth.
b) Briefly explain the technique you used to solve (a).
2. On the first day of the month, 4 customers come to a restaurant. Afterwards, those 4
customers come to the same restaurant once in 2,4,6 and 8 days respectively.
a) On which day of the month, will all the four customers come back to the restaurant
together?
b) Briefly explain the technique you used to solve (a).
Part 2
3. Logs are stacked in a pile with 24 logs on the bottom row and 10 on the top row. There
are 15 rows in all with each row having one more log than the one above it.
a) How many logs are in the stack?
b) Briefly explain the technique you used to solve (a).
4. A company is offering a job with a salary of Rs. 50,000.00 for the first year and a 4%
raise each year after that. If that 4% raise continues every year,
a) Find the total amount of money an employee would earn in a 10-years career.
b) Briefly explain the technique you used to solve (a).
Part 3
5. Define the multiplicative inverse in modular arithmetic and identify the multiplicative
inverse of 6 mod 13 while explaining the algorithm used.
Activity 02
Part 1
2. The manager of a supermarket collected the data of 25 customers on a certain date. Out
of them 5 purchased Biscuits, 10 purchased Milk, 8 purchased Fruits, 6 purchased both
Milk and Fruits.
Let B represents the randomly selected customer purchased Biscuits, M represents
the randomly selected customer purchased Milk and F represents the randomly
selected customer purchased Fruits.
Represent the given information in a Venn diagram. Use that Venn diagram to answer
the following questions.
a) Find the probability that a randomly selected customer either purchased Biscuits
or Milk.
b) Show that the events “The randomly selected customer purchased Milk” and
“The randomly selected customer purchased Fruits” are independent.
3. Suppose a voter poll is taken in three states. Of the total population of the three states,
45% live in state A, 20% live in state B, and 35% live in state C. In state A, 40% of
voters support the liberal candidate, in state B, 30% of the voters support the liberal
candidate, and in state C, 60% of the voters support the liberal candidate.
Let A represents the event that voter is from state A, B represents the event that voter
is from state B and C represents the event that voter is from state C. Let L represents
the event that a voter supports the liberal candidate.
a) Find the probability that a randomly selected voter does not support the liberal
candidate and lives in state A.
b) Find the probability that a randomly selected voter supports the liberal candidate.
c) Given that a randomly selected voter supports the liberal candidate, find the
probability that the selected voter is from state B.
4. In a box, there are 4 types [Hearts, Clubs, Diamonds, Scorpions] of cards. There are 6
Part 2
6. Two fair cubes are rolled. The random variable X represents the difference between the
values of the two cubes.
Y=y 1 2 3 4 5
P(Y=y) 1/3 1/6 1/4 k 1/6
where k is a constant.
a) Find the value of k.
b) Find P(Y≤3).
c) Find P(Y>2).
Part 3
a) Let X be the number of matches that will be won by the team. What are the
possible values of X?
b) What is the probability that the team will win exactly 6 matches?
c) What is the probability that the team will lose 2 or less matches?
d) What is the mean number of matches that the team will win?
e) What are the variance and the standard deviation of the number of matches that
the team will win?
11. In a boys’ school, there are 45 students in grade 10. The height of the students was
measured. The mean height of the students was 154 cm and the standard deviation was
2 cm. Alex’s height was 163 cm. Would his height be considered an outlier, if the
height of the students were normally distributed? Explain your answer.
12. The battery life of a certain battery is normally distributed with a mean of 90 days and
a standard deviation of 3 days.
For each of the following questions, construct a normal distribution curve and provide
the answer.
a) About what percent of the products last between 87 and 93 days?
b) About what percent of the products last 84 or less days?
For each of the following questions, use the standard normal table and provide the
answer.
c) About what percent of the products last between 89 and 94 days?
d) About what percent of the products last 95 or more days?
13. In the computing field, there are many applications of Probability theories. Hashing
and Load Balancing are also included to those. Provide an example for an application
of Probability in Hashing and an example for an application of Probability in Load
Balancing. Then, evaluate in detail how Probability is used for each application while
assessing the importance of using Probability to those applications.
Part 1
1. Find the equation (formula) of a circle with radius r and center C(h,k) and if the Center
of a circle is at (3,-1) and a point on the circle is (-2,1) find the formula of the circle.
2. Find the equation (formula) of a sphere with radius r and center C(h, k, l) and show that
x2 + y2 + z2 - 6x + 2y + 8z - 4 = 0 is an equation of a sphere. Also, find its center and
radius.
Part 2
Construct an equation to find the volume of the given Tetrahedron using vector methods
and if the vectors of the Tetrahedron are a=(i+4j-2k) , b=(3i-5j+k) and c=(-4i+3j+6k),
find the volume of the Tetrahedron using the above constructed equation..
Activity 04
Part 1
1. Determine the slope of the following functions.
i. f(x) = 2x – 3x4 + 5x + 8
ii. f(x) = cos(2x) + 4x2 – 3
2. Let the displacement function of a moving object is S(t) = 5t 3 – 3t2 + 6t. What is the
function for the velocity of the object at time t.
Part 2
3. Find the area between the two curves f(x) = 2x2 + 1 and g(x) = 8 – 2x on the interval
(-2) ≤ x ≤ 1 .
4. It is estimated that t years from now the tree plantation of a certain forest will be
increasing at the rate of 3t 2 + 5t + 6 hundred trees per year. Environmentalists have
found that the level of Oxygen in the forest increases at the rate of approximately 4
units per 100 trees. By how much will the Oxygen level in the forest increase during the
next 3 years?
Part 3
5. Sketch the graph of f(x) = x 5- 6x3 + 3 by applying differentiation methods for analyzing
where the graph is increasing/decreasing, local maximum/minimum points [Using the
6. Identify the maximum and minimum points of the function f(x)= 2x 3 - 4x4 + 5x2 by
further differentiation. [i.e Justify your answer using both first derivative test and
second derivative test.]
1)
a) length = 20 m width = 16 m
square shape towel area = 20 m x 16 m
= 320 m2
B) The largest number, which is the factor of two or more number is called the Greatest Common Factor
(GCF). It is the largest number (factor) that divide them resulting in a Natural number. Once all the factors
of the number are found, there are few factors which are common in both. The largest number that is found
in the common factors is called the greatest common factor. The GCF is also known as the Highest
Common Factor (HCF)
2)
a) first customer second customer third customer fourth customer
2 4 6 8
21 22 21 x 31 23
After 25 days……..
b) The least common multiple, or LCM, is another number that's useful in solving many math problems.
Let's find the LCM of 30 and 45. One way to find the least common multiple of two numbers is to first list
the prime factors of each number.
30 = 2 × 3 × 5
45 = 3 × 3 × 5
2: one occurrence
3: two occurrences
5: one occurrence
2 × 3 × 3 × 5 = 90 <— LCM
After you've calculated a least common multiple, always check to be sure your answer can be divided
evenly by both numbers.
Part 2
3)
a) bottom row = 24 top row = 10 all rows = 15
b) In mathematics, the term “graded” has a number of meanings, mostly related: In abstract algebra, it
refers to a family of concepts: An algebraic structure is said to be -graded for an index set if it has a
gradation or grading, i.e. a decomposition into a direct sum of structures; the elements of.
4)
a) The first year A1 = 50000.00
The growth factor :
r= 4%
= 4
100
= 0.04
A1 , A1( 1 + r ) , A1 ( 1 + r)2 , …………….
S10 = A1 ( 1 – ( 1 + r )10 )
1–(1+r)
= A1 [ ( 1 + r )10 ] - 1
r
= RS.600405.36
Part 3
5) Step 1
Forward part of Euclidean algorithm
13 = 6(2) + 1 ----(1) here 2 is quotas, 1 is reminder
H.C.F (6,13) = 1 so 6 & 13 are relatively prime
Multiplicative inverse of 6 mod 13 exists
Step 2
Backward part of the Euclidean algorithm
From equation
1 = 13 – 6(2)
1 = 13(1) – 6(2)
So, 1 = 6(-2) mod 13
1 = 6(11) mod 13
Multiplicative inverse of 6 mod 13 is 11
6) Prime numbers
A prime number is a number greater than 1 with only two factors – themselves and 1.
A prime number cannot be divided by any other numbers without leaving a remainder.
An example of a prime number is 13. It can only be divided by 1 and 13. Dividing a prime number by
another number results in numbers left over e.g. 13 ÷ 6 = 2 remainder 1.
15 is not an example of a prime number because it can be divided by 5 and 3 as well as by itself and 1.
Prime number is important and used mostly for the cryptography in computer security field. Take a look at
an algorithm called RSA (Rivest, Shamir, Adleman). RSA algorithm works by utilising the fact that prime
number factorisation is a hard computing problem. RSA utilising very big prime numbers that takes
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 6|Page
considerable amount of time (practically impossible with current computng power and limited time) to
complete factorisation.
This makes RSA algorithm so unique. The concept is very simple, whereby we compute the product of two
very large prime numbers, which can easily be done. However, when people gain access to the one of the
numbers (public key), it is very hard to factor back to get the other number (private key).
Activity 2
Part 1
1)
Conditional probability is defined as the likelihood of an event or outcome occurring, based on the
occurrence of a previous event or outcome. Conditional probability is calculated by multiplying the
probability of the preceding event by the updated probability of the succeeding, or conditional, event.
For example:
1) Event A is that an individual applying for college will be accepted. There is an 80% chance that
this individual will be accepted to college.
2) Event B is that this individual will be given dormitory housing. Dormitory housing will only be
provided for 60% of all of the accepted students.
A conditional probability would look at these two events in relationship with one another, such as the
probability that you are both accepted to college, and you are provided with dormitory housing.
Conditional probability can be contrasted with unconditional probability. Unconditional probability
refers to the likelihood that an event will take place irrespective of whether any other events have
taken place or any other conditions are present.
KEY TAKEAWAYS
Conditional probability refers to the chances that some outcome occurs given that another event has
also occurred.
It is often stated as the probability of B given A and is written as P(B|A), where the probability of B
depends on that of A happening.
Conditional probability can be contrasted with unconditional probability (Anon., n.d.).
N ( M ) = 10
N(F)=8
a)
5+10
p(BUM)=
25
3
=
5
= 0.6
b)
8
p(F)=
25
10 2
p(M)= =
25 5
2 8
p(M).p(F)= ×
5 25
16
=
125
BUT
6 16
P(M∩F)= ≠
25 125
؞P(M∩F)≠P(M).P(F)
The events “ The randomly selected customer purchased Milk “ and “ The randomly selected customer
purchased Fruits “ are independent.
3)
45 40
P(A)= = 0.45 P(L|A)= = 0.4
100 100
20 30
P(B)= = 0.2 P(L|B)= = 0.3
100 100
35 60
P(C)= = 0.35 P(L|C)= = 0.6
100 100
a)
P ( L'/A ) = 1 - P ( L | A )
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 9|Page
= 1 – 0.4
= 0.6
b)
P(L)=P(L|A).P(A).+P(L|B).P(B)+P(L|C).P(C)
= 0.4 × 0.45 + 0.3 × 0.2 + 0.6 × 0.35
= 0.45
c)
P(B|L).P(L) = P(L|B).P(B)
¿
P ( B | L ) = P ( L| B ¿ . P (B) P (L)
0.3 ×0.2
=
0.45
= 0.13
4)
a)
There are 5 hearts in the box if one is pulled and not replaced , and 25 total cards remaining
5
P ( Second card is heart ) =
25
1
=
5
3 1
P ( Both are hearts ) = ×
13 5
3
=
65
= 0.046
b) P (one club card and one diamond card) = P (1st Diamond) * P (2nd Club) + P (1st club) * P (2nd
Diamond)
8 7 7 8
¿ × + ×
26 25 26 25
56 56
¿ +
650 650
c)
P ( Both are same ) = P ( both are hearts ) + P ( both are clubs ) + P ( both are diamonds ) +
P ( both are scorpions )
6 5 7 6 8 7 5 4
P ( Both are same ) = × + × + × + ×
26 25 26 25 26 25 26 25
148
=
650
74
=
325
= 0.228
Part 2
5)
Discrete and Continuous Random Variables:
A probability distribution is a formula or a table used to assign probabilities to each possible value of a
random variable X. A probability distribution may be either discrete or continuous. A discrete distribution
means that X can assume one of a countable (usually finite) number of values, while a continuous
distribution means that X can assume one of an infinite (uncountable) number of different values.
Geometric
Poisson
You use the binomial distribution to compute probabilities for a process where only one of two possible
outcomes may occur on each trial. The geometric distribution is related to the binomial distribution; you
use the geometric distribution to determine the probability that a specified number of trials will take place
before the first success occurs. You can use the Poisson distribution to measure the probability that a given
number of events will occur during a given time frame.
Continuous probability distributions
Many continuous distributions may be used for business applications; two of the most widely used are:
Uniform
Normal
The uniform distribution is useful because it represents variables that are evenly distributed over a given
interval. For example, if the length of time until the next defective part arrives on an assembly line is
equally likely to be any value between one and ten minutes, then you may use the uniform distribution to
compute probabilities for the time until the next defective part arrives.
6)
Distances here
1 2 3 4 5 6 ➊
1 0 1 2 3 4 5
2 1 0 1 2 3 4
3 2 1 0 1 2 3
4 3 2 1 0 1 2
5 4 3 2 1 0 1
6 5 4 3 2 1 0
Final count
0 6
1 10
2 8
➋ 3 6
4 4
5 2
All are = 36
a)
6 10 8 6 4 2 0
E(x)=(0× )+(1× )+(2× )+(3× )+(4× )+(5× )+(6× )
36 36 36 36 36 36 36
b)
condition = X
variation here
V ( x ) = E ( X – E ( X ))2
E ( X2 – 2X . E ( X ) + [ E ( X ) ]2)
E ( X2 ) – 2E ( X ) . E ( X ) + [ E ( X ) ]2
E ( X2 ) – [ E ( X ) ] 2
Ʃ [ x2 . P ( X = x ) ] – { Ʃ [ x . P ( X = x ) ] } 2
E(X)
6 10 8 6 4 2 0
V ( X ) = ( 02 × ) + ( 12 × ) + ( 22 × ) + ( 32 × ) + ( 42 × ) + ( 52 × ) + ( 62 × ) - [E
36 36 36 36 36 36 36
( X ) ]2
10 32 54 64 50 70 2
=0+ + + + + +0–( )
36 36 36 36 36 36
210 70 ×70
= -
36 36 ×36
210× 36−4900
=
36 ×36
7560−4900
=
1296
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 14 | P a g e
2660 1330 665
= = =
1296 648 324
= 2.056
SD2 = ( V ( x ) )
SD = √ V (x)
SD = √ 665/324
SD = 1.4326
c)
A = x – 10
A values are here
0 -10
1 -9
2 -8
3 -7
4 -6
5 -5
Equation is here
6 10 8 6 4 2
E ( A ) = ( -10 × ) + ( -9 × ) + ( -8 × ) + ( -7 × ) + ( -6 × ) + ( -5 × )
36 36 36 36 36 36
−60 −90 −64 −42 −24 −10
= + + + + +
36 36 36 36 36 36
−290 −145
= =
36 18
= -8.055
d)
6 10 8 6 4 2
V(A)=( (-10)2 × ) + ( (-9)2 × ) + ( (-8)2 × ) + ( (-7)2 × ) + ( (-6)2 × ) + ( (-5)2 × ) - [E ( A ) ]2
36 36 36 36 36 36
100× 6 81× 10 64 ×8 49 ×6 36 ×4 25× 2 −290 2
= + + + + + –( )
36 36 36 36 36 36 36
600 810 512 294 144 50 −290 ×−290
= + + + + + -
36 36 36 36 36 36 36 × 36
2410 84100
= -
36 36 ×36
86760−84100
=
36 × 36
2660 1330 665
= = =
1296 648 324
V[A] = 2.056
SD [ A ] =√ V [ A ] =1.434
= 0.514
SD [B] = √ V [ B ] = √ 0.514
SD [B] =0.717
E)
The mean of Brian's score is half that of Amold's. The Brian score has a variance of one-
quarter that of the Amold score. Brian's score has a quality deviation that is half that of the
Amold score.
b)
P(Y≤3)=P(Y=1)+P(Y=2)+P(Y=3)
1 1 1
P(Y≤3)= + +
3 6 4
4+ 2+3
=
12
9 3
= =
12 4
= 0.75
c)
P(Y>2)=P(Y=3)+P(Y=4)+P(Y=5)
1 1
P(Y>2)= +k+
4 6
1 1 1
= + +
4 12 6
3+1+2
=
12
a)
X = 1,2,3,4,5,6,7,8,9,10
b)
10
P(b)= C6 ( 0.75)6 ( 1 – 0.75)10 – 6
10
= C6 ( 0.75)6 ( 0.25)4
10 !
= ( 0.75)6 ( 0.25)4
( 10−6 ) ! 6 !
10× 9 ×8 ×7 × 6 !
= ( 0.75)6 ( 0.25)4
4 ! ×6 !
10× 9 ×8 ×7
= × 0.18 × 0.004
4 × 3× 2× 1
= 210 × 0.18 × 0.004
= 0.1512
c)
Loss – 2 8 win
Loss – 1 9 win
d)
µ = np
= 10 × 0.75
= 7.5
e)
SD2 = V ( x ) = np ( 1 - p )
= 7.5 × 0.25
= 1.875
SD = √ V (x)
SD = √ 1.875
= 1.369
11)
µ = 154 SD = 2
154 µ - 3σ
= 154 – 3 × 2
= 154 – 6
= 148
There are 163 outliers (extreme points) under the Empirical rule.
163−154
Alex's z-score: z = =4.5.
2
A standard cut-off value for finding outliers are Z-scores of +/-3 or further from zero.
Since 4.5>3, the Alex's height is an outlier.
12)
Empirical rule gives us information about the percentage of data that lies within one, two, and three
deviation of the mean.
a)
87 & 93
µ-σ µ+σ
= 90 – 3 = 90 + 3
= 87 = 93
According to the empirical rule that the area under the normal curve between µ - σ & µ + σ is 68% the
probability is 0.68
Percentage is 68.2%
b)
84 µ - 2σ
= 90 – ( 2 × 3)
= 84
According to the empirical rule that the area under normal curve less than µ - 2σ is 2.1% + 0.1%
Therefore the percent of the products last 84 or less days
= 0.021 + 0.001
= 0.022
Percent is 2.2%
c)
x−µ
z=
σ
89−90
=
3
= - 0.33 P ( -0.33 ) = 0.37070
x−µ
z=
σ
13)
Families of Hash Functions
You can use a single hash function h to maintain an unordered set of objects in a computer. The reason this
is a problem that needs solving is because if you were to store items sequentially in a list, and if you want
to determine if a specific item is already in the list, you need to potentially check every item in the list (or
do something fancier). In any event, without hashing you have to spend some non-negligible amount of
time searching. With hashing, you can choose the location of an element x \in U based on the value of its
hash h(x). If you pick your hash function well, then you’ll have very few collisions and can deal with them
efficiently. The relevant section on Wikipedia has more about the various techniques to deal with collisions
in hash tables specifically, but we want to move beyond that in this post.
Here we have a family of random hash functions. So what’s the use of having many hash functions? You
can pick a hash randomly from a “good” family of hash functions. While this doesn’t seem so magical, it
has the informal property that it makes arbitrary data “random enough,” so that an algorithm which you
designed to work with truly random data will also work with the hashes of arbitrary data. Moreover, even
if an adversary knows \mathscr{H} and knows that you’re picking a hash function at random, there’s no
way for the adversary to manufacture problems by feeding bad data. With overwhelming probability the
worst-case scenario will not occur (Anon., n.d.).
Load
balancing
The mathematical version of this problem usually goes with the metaphor of balls and bins. You have some
collection of m balls and n bins in which to put the balls, and you want to put the balls into the bins. But
there’s a twist: an adversary is throwing balls at you, and you have to put them into the bins before the next
ball comes, so you don’t have time to remember (or count) how many balls are in each bin already. You
only have time to do a small bit of mental arithmetic, sending ball i to bin f(i) where f is some simple
function. Moreover, whatever rule you pick for distributing the balls in the bins, the adversary knows it and
will throw balls at you in the worst order possible.
Hashing examples
1) In schools, the teacher assigns a unique roll number to each student. Later, the teacher uses that roll
number to retrieve information about that student.
2) A library has an infinite number of books. The librarian assigns a unique number to each book. This
unique number helps in identifying the position of the books on the bookshelf.
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 26 | P a g e
Load balancing examples
1) Workload Distribution Distribution of workloads to resources such as services, servers
Host – based Distributing requests based on the or
requested host name
Path – based Using the entire URL to distribute
requests as opposed to just the
hostname
Content - based Inspecting the message content of a
request. This allows distribution based
on content such as the value of a
parameter
platforms. This is the core functionality provided by a load balancer and has several
common variations.
Autoscaling starting up and shouting down resources in response to demand condition. For
example , a cloud load balancer that starts new computing instances in response to peak traffic and
releases the instances when traffic subsides.
Load balancing also plays a key role in a cloud’s scalability. By nature, cloud infrastructures are supposed
to easily scale up to accommodate any uptick or surge in traffic. When a cloud “scales up”, it typically
spins up multiple virtual servers and runs multiple application instances. The main network component
responsible for distributing traffic across these new instances is/are the load balancer(s).
Without load balancers, newly spun virtual servers wouldn’t be able to receive the incoming traffic in a
coordinated fashion or if at all. Some virtual servers might even be left handling zero traffic while others
became overloaded.
Load balancers are also capable of detecting unavailable servers and redirecting traffic to those still
operational. If you subscribe to one of the large cloud service providers (like AWS) and enabled the
required feature, your cloud infrastructure can span multiple geographical regions.
Thus, if one region becomes inoperational due to a natural calamity like a catastrophic earthquake, flood,
or tsunami, load balancers can direct traffic to regions that haven’t been affected by the calamity.
Depending on the load balancing algorithms they support, load balancers may even be able to determine if
a certain server (or set of servers) is likely to get overloaded more quickly and redirect traffic to other
nodes that are deemed healthier. Proactive capabilities like this can significantly reduce the chances of
your cloud services becoming unavailable.
Hashing importance
1) Hashing gives a more secure and adjustable method of retrieving data compared to any other data
structure. It is quicker than searching for lists and arrays. In the very range, Hashing can recover data
in 1.5 probes, anything that is saved in a tree. Hashing, unlike other data structures, doesn’t define
Activity 3
Part1
1)
√ ( y−k ) + ( x −h )
2 2
= r
2 2
( y−k ) + ( x−h ) = r2
2)
| pc | = r
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 30 | P a g e
√ ( x−h ) +( y −k ) +( z−l )
2 2 2
= r
2 2 2
(x–h) +(y–k) +(z–l) = r2
Then let,,,
X2 + y2 + z2 – 6x + 2y + 8z - 4 = 0
X2 – 6x + y2 + 2y + z2 + 8z – 4 =0
( x – 3 )2 – 9 + (y + 1)2 – 1 + (z + 4)2 – 16 – 4 =0
( x – 3 )2 + (y – (-1))2 + (z – (-4))2 = ( √ 30)2
Figure 7 Parallelogram
a = ( I + 3j – k ) ; b = ( 7i – 2j + 4k )
I j k
1 3 -1 10 I – 11 j – 23 k
7 -2 4
| a × b | = √ (10)2 +(−11)2+(−23)2
= 27. 39
1
Hence area of parallelogram = |a × b |
2
1
= × 27. 39
2
= 13. 695
Part 2
4)
Table is here
From ⓶
¿
Y = −3 ×2.5+10 ¿ 5
¿
Y = −7.5+10 ¿ 5
2.5
Y=
5
Y = ½ = 0.5
a = ( I + 4j – 2k )
b = ( 3i – 5j + k )
c = ( -4i + 3j + 6k )
1
Tetrahedron formula is ∨( a × b ) . c∨¿
6
(a×b)= I j k
1 4 -2
3 -5 1
= I (4 – 10 ) – j ( 1 + 6 ) + k (-5 – 12 )
= - 6 I – 7 j – 17 k
| ( a ×b ) .c | is ;
| ( - 6 I – 7 j – 17 k ) . ( -4i + 3j + 6k )|
= 24 + (-21) + (-102)
= 24 – 123
= -99
= | - 99 |
= 99
1
formula is ∨( a × b ) . c∨¿
6
= 99/6
= 16.5
D s(t) = 15t2 - 6t + 6
dt
velocity = 15t2 - 6t + 6
Part 2
3)
1 1
3 t2 + 5 t + 6
3 . 12 + 5 . 1 + 6
14 hundred trees
3 t2 + 5 t + 6
3 . 22 + 5 . 2 + 6
28 hundred trees
3 t2 + 5 t + 6
3 . 32 + 5 . 3 + 6
48 hundred trees
4
9000 ×
100
= 360 units
X=0 f'(x)=0
Inflection point at n = 0
f '' ( x ) =0
lim f (x) = x5 ( 1 - 6 + 3 )
2 5
x→−∞ x x
lim f (x) = −∞
x→−∞
f ( x ) +∞ , x 3
f ( x ) −∞ , x -3
Figure 14 graph
table(Author developed)
So;
X = 0 or ( -16x2 + 6x + 10 ) = 0
-2 ( 8x2 – 3x – 5 ) = 0
8x2 – 3x – 5 =0
Then;
−(−3) ± √ (−3)2−4 ×8 ×(−5)
x=
2× 8
+3 ± √9+160
x=
16
3+13 3−13
X= or x =
16 16
−10 −5
X = 1 or x = =
16 8
So;
−5
X=1 , x= , x=0
8
X=1,f(x)=3 f'(x)=0
Local Maximum at ( 1 , 3 )
f '' ( x ) = -26 < 0
−5
x= , f'(x)=0
8 Local Maximum
f '' ( x ) = -1.25 < 0
x=0 f'(x)=0
Local Minimum
W.M.S.A.Jayasinghe Maths Unit – 11 Batch – 40 44 | P a g e
f '' ( x ) = 10 > 0
Table here
References
Anon., n.d. [Online]
Available at: https://www.quora.com/What-is-a-growth-factor-in-math