0% found this document useful (0 votes)
44 views1 page

College of Computing & Information Sciences Discrete Mathematics (Assignment-2)

This document contains instructions for Assignment 2 of a Discrete Mathematics course. It discusses plagiarism, stating that copying text or ideas without citing the source is considered fraud. It instructs students to avoid plagiarism and notes assignments containing plagiarism will not be graded. It provides 6 questions on topics like data encoding, functions, sums, sequences, and the Fibonacci series. Students must submit their solutions by April 26th to receive grading.

Uploaded by

Ajmal Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views1 page

College of Computing & Information Sciences Discrete Mathematics (Assignment-2)

This document contains instructions for Assignment 2 of a Discrete Mathematics course. It discusses plagiarism, stating that copying text or ideas without citing the source is considered fraud. It instructs students to avoid plagiarism and notes assignments containing plagiarism will not be graded. It provides 6 questions on topics like data encoding, functions, sums, sequences, and the Fibonacci series. Students must submit their solutions by April 26th to receive grading.

Uploaded by

Ajmal Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

College of Computing & Information Sciences

Discrete Mathematics (Assignment-2 )

Plagiarism:

“Plagiarism is copying another person’s text or ideas and passing the copied material as your own
work. You must both delineate (i.e., separate and identify) the copied text from your text and give
credit to (i.e., cite the source) the source of the copied text to avoid accusations of plagiarism.
Plagiarism is considered fraud and has potentially harsh consequences including loss of job, loss
of reputation, and the assignation of reduced or failing grade in a course.

Instructions:
Your solution should free from plagiarism
All those assignments fall in plagiarism, will not be graded
Late submission will also not be graded

Assigned date: 22-04-2019 Due data: 26-04-2019

(Q.1) Data stored on a computer disk or transmitted over a data network are usually
represented as a string of bytes. Each byte is made up of 8-bit. How many bytes
are required to encode 100 bits of data? Using ceil and floor function

(Q.2) A function f is defined by f(x) = px + q. Given that f(1) = 5 and f(-2) = 10, find the value of
p and of q. find f -1(x) and f2(x)

(Q.3) What are the values of the following sums?


5 100 j 3 2
n 2 −1 n −1−i
(a) ∑ (k + 1)
k =1
(b) ∏ (−1)
j =1
(c) ∑∑ (i − j )
i =1 j =1
(d) ∑ ∑1
i =1 j = i + 2
(Q.4) Given a sequence, find the formula of an ?
0, 2, 8, 26, 80, 242, 728, 2186, 6560, 19682,… nth term

(Q.5) Suppose that a and b are integers, a ≡ 11 (mod 19), and b ≡ 3 (mod 19). Find the integer c with
0 ≤ c ≤ 18 such that

(a) c ≡ 13a (mod 19).


(b) c ≡ 8b (mod 19).
(c) c ≡ a − b (mod 19).
(d) c ≡ 7a + 3b (mod 19).

(Q.6) Describe the Fibonacci series recursion. Draw the recursion tree for n = 5.

You might also like