Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

ASSIGNMENT

_________________________________________________________________________

CBMA2103
DISCRETE MATHEMATICS
SEMESTER JANUARY 2024
___________________________________________________________________________

SPECIFIC INSTRUCTION

1. Answer in ENGLISH .

2. Submit your assignment ONCE only in a SINGLE file.

3. Submit your assignment ONLINE.

4. Submission date: xxx 2024

5. This assignment accounts for 60% of the total marks for the course.
ASSIGNMENT QUESTION

PURPOSE
The purpose of this assignment is to ensure the student can understand and solve the
mathematical problem related to set, relation, function and propositional logic topic.

QUESTION 1

a) Describe each of the following sets in words and list all the elements of
the set.
i. {x : x + 3 ∈ N} (2)
ii. {x ∈ N : x + 3 ∈ N} (2)
iii. {x : x ∈ N ∨ −x ∈ N} (2)
iv. {x : x ∈ N ∧ −x ∈ N} (2)

b) Given that A ={1, 2, 3, 4, 5, 6}, B ={2, 4, 6}, C ={1, 2, 3} and


D ={7, 8, 9}.
Determine which of the following are true or false.

i. A⊂B (1)
ii. B⊂A (1)
iii. B∈C (1)
iv. ∅∈A (1)
v. ∅⊂A (1)
vi. 3∈C (1)
vii. {3} ⊂ C (1)

(Total marks:15)
QUESTION 2

The following figure shows two functions, g and f are defined for x ∈ ℝ.

Determine the following:

a) State the domain of g and f. (3)


b) State the codomain of g and f. (3)
c) ° ( ) (2)
d) ° ( ) (2)
e) ( ) (2)
f) ( ) (2)
g) (− ) (2)
h) ( ) (2)
i) (− ) (2)

(Total marks:20)
QUESTION 3

Assume that you are a cybersecurity analyst in your organisation who are
investigating a suspicious email. You have three propositions to consider:

P: The email contains an attachment.


Q: The email is from an unknown sender.
R: The email is identified by the spam filter.

You need to determine the conditions under which you should consider the email
potentially harmful.

Answer the following questions:


a) Create a truth table that covers all possible combinations of (6)
propositions P, Q, and R.
b) Identify the conditions under which the email should be considered (3)
potentially harmful.
c) Explain the logical reasoning behind your conclusions. (6)
d) Now, consider a new proposition:
S: The email has a suspicious subject line.
i. Create an extended truth table that includes all possible (4)
combinations of propositions P, Q, R, and S.
ii. Identify the conditions under which the email should be (6)
considered potentially harmful based on these four
propositions, and explain the logical reasoning behind your
conclusions.
(Total marks:25)

(Overall Total:60 marks)

You might also like