Unit 14 Maths For Computing
Unit 14 Maths For Computing
Higher Nationals in
Computing
Unit 14 : Maths for Computing
Higher Nationals
Internal verification of assignment brief – BTEC (RQF)
Assessor Name:
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.
Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed
Assessor signature
Date
Higher Nationals
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Assessor Internal Verifier
Unit 14 : Maths for Computing
Unit(s)
Importance of Maths in the Field of Computing
Assignment title
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded
match those shown in the assignment Y/N
brief?
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals – Summative Assignment Feedback Form
Student Name/ID
LO3 Determine solutions of graphical examples using geometry and vector methods.
Pass, Merit & Distinction P5 P6 M3 D3
Descripts
LO4 Evaluate problems concerning differential and integral calculus.
Resubmission Feedback:
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You
will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both in-
text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work and to
present it as my own without attributing the sources in the correct way. I further understand
what it means to copy another’s work.
Action Plan
Summative feedback
Assessor’s
Date
Signature
Student’s
Signature Date
Assignment Brief
Unit Tutor
Issue Date
Submission Format:
This assignment should be submitted at the end of your lesson, on the week stated at the front of this
brief. The assignment can either be word-processed or completed in legible handwriting.
If the tasks are completed over multiple pages, ensure that your name and student number are present on
each sheet of paper.
LO3 Determine solutions of graphical examples using geometry and vector methods.
Part 1
1. A farmer wants to make square shaped vegetable beds. The required squared area of vegetable
beds will be prepared from a land which is 28 feet in length and 24 feet in width.
a) Find the minimum number of squared vegetable beds that can be prepared from the land
without wasting any area.
b) Briefly explain the technique you used to solve (a).
2. In a company, 5 employees are doing overtime work. First day of the month, all the 5
employees did overtime work. Afterwards, those 5 employees do the overtime work once in
3,4,6, 8 and 12 days respectively.
a) On which day of the month, will all the 5 employees do the overtime work together?
b) Briefly explain the technique you used to solve (a).
Part 2
3. In a warehouse, boxes are stored such that 30 boxes on the bottom row and 21 on the top row.
There are 10 rows in all, with each row having one more box than the one above it.
a) How many boxes have been stored?
b) Briefly explain the technique you used to solve (a).
Part 3
1. Define the multiplicative inverse in modular arithmetic and identify the multiplicative inverse
of 7 mod 8 while explaining the algorithm used.
2. Prime numbers are important to many fields. In the computing field also prime numbers are
applied. Provide examples and in detail explain how prime numbers are important in the field of
computing.
Activity 02
Part 1
2. An aesthetic club has 100 members. Out of them 40 do dancing, 45 do music and 24 do drama.
15 do both dancing and music, 11 do both dancing and drama and 13 do both music and drama
and 5 do dancing, music and drama. Remaining members do arts. Let D represents the
randomly selected member does dancing, M represents the randomly selected member does
music, R represents the randomly selected member does drama. A represents the randomly
selected member does arts.
Represent the given information in a Venn diagram. Use that Venn diagram to answer the
following questions.
a) Find the probability that a randomly selected member either does dancing or music.
b) Find whether the events “The randomly selected member does drama” and “The
randomly selected member does music” are independent or not.
3. Suppose a survey was done in three states on the Covid-19 pandemic situation. Of the total
population of the three states, 25% live in state X, 45% live in state Y, and 30% live in state Z.
In state X, 20% of the citizens have been infected with Covid-19, in state B, 10% of the
citizens have been infected with Covid-19, and in state C, 15% of the citizens have been
infected with Covid-19.
Let X represents the event that the citizen is from state X, Y represents the event that the
citizen is from state Y and Z represents the event that the citizen is from state Z. Let C
represents the event that the citizen has been infected with Covid-19.
a) Find the probability that a randomly selected citizen has not been infected with Covid-19
and lives in state X.
b) Find the probability that a randomly selected citizen has been infected with Covid-19.
c) Given that a randomly selected citizen has been infected with Covid-19, find the
probability that the selected citizen is from state Y.
4. In a game if the player wins, a random gift will be given. There are 3 types [Watch, Voucher,
Pen Drive] of gifts for the winners. There are 7 Vouchers, 6 Watches and 5 Pen Drives. The
number tags of the gifts are stored in a box. If two players win the game and the number tags
of the gifts are selected randomly without replacement.
a) Find the probability that the both winners get a Voucher.
b) Find the probability that one gift is a Watch and the other gift is a Pen Drive.
c) Find the probability that the two winners get different gifts.
Part 2
6. There are two boxes. In each box there are 4 cards with a different number printed on it. The
four cards have been numbered as 1,2,3,4 in each box. Two cards are drawn random from each
box. The random variable X represents the difference between the number on the card from
box 1 minus the number on the card from box 2.
Y=y 1 2 3 4 5
P(Y=y) 1/8 1/4 1/3 k 1/8
where k is a constant.
a) Find the value of k.
b) Find P(Y≤4).
c) Find P(Y>3).
Part 3
8. The “Winkles” quiz team has a winning rate of 72%. The team is planning to participate in 8
quizzes in the next month.
a) Let Y be the number of quizzes win by the team. What are the possible values of Y?
b) What is the probability that the team will win exactly 4 quizzes?
c) What is the probability that the team will lose 2 or less quizzes?
d) What is the mean number of quizzes that the team will win?
e) What are the variance and the standard deviation of the number of quizzes that the team
will win?
9. In a boys’ school, there are 40 students in grade 9. The weight of the students was measured.
The mean weight of the students was 55 kg and the standard deviation was 2.5 kg. Peter’s
weight was 64kg. Would his weight be considered an outlier, if the weight of the students
were normally distributed? Explain your answer.
10. The working life of a certain electrical equipment is normally distributed with a mean of 180
days and a standard deviation of 4 days.
For each of the following questions, construct a normal distribution curve and provide the
answer.
a) About what percent of the products last between 176 and 184 days?
b) About what percent of the products last between 180 and 184 days?
For each of the following questions, use the standard normal table and provide the answer.
c) About what percent of the products last 172 or less days?
d) About what percent of the products last 184 or more days?
11. In the computing field, there are many applications of Probability theories. Hashing and Load
Balancing are also included to those. Provide an example for an application of Probability in
Hashing and an example for an application of Probability in Load Balancing. Then, evaluate
in detail how Probability is used for each application while assessing the importance of using
Probability to those applications.
Activity 03
Part 1
1. Find the equation (formula) of a circle with radius r and center C(h,k) and if the Center of a
circle is at (7,-2) and a point on the circle is (-3,5) find the formula of the circle.
2. Find the equation (formula) of a sphere with radius r and center C(h, k, l) and show that
x2 + y2 + z2 - 14x + 6y - 2z - 3 = 0 is an equation of a sphere. Also, find its center and radius.
Part 2
Construct an equation to find the volume of the given Tetrahedron using vector methods and if the
vectors of the Tetrahedron are a=(2i+j-3k), b=(-i+2j+4k) and c=(5i-7j+k), evaluate the volume of the
Tetrahedron.
Activity 04
Part 1
1. Determine the slope of the following functions.
i. f(x) = 4x3 + 5x4 - 9x + 2
ii. f(x) = sin(3x) - 5x3 – 7
2. Let the velocity function of a moving object is V(t) = 7t3 + 5t2 - 4t. What is the function for the
acceleration of the object at time t.
Part 2
3. Find the area between the two curves f(x) = 3x2 - 4 and g(x) = 2x+5 on the interval
(-1) ≤ x ≤ 1.
4. It is estimated that t years from now the bee population of a certain farm will be increasing at
the rate of 9t 2 + 10t - 7 hundred bees per year. It has been found that the number of flowers in
the nearby botanical garden increases at the rate of approximately 400 flowers per 10 bees. By
how much will the number of flowers in the nearby botanical garden increase during the next 2
years?
Part 3
5. Sketch the graph of f(x) = x 3 - x4 + 6x2 + 3 by applying differentiation methods for analyzing
where the graph is increasing/decreasing, local maximum/minimum points [Using the second
derivative test], concave up/down intervals with inflection points.
6. Identify the maximum and minimum points of the function f(x)= −4x 2 + 6x + 3 by further
differentiation. [i.e Justify your answer using both first derivative test and second derivative
test.]
Grading Rubric
Acknowledgement
Thank you.
The acronym 'GCD' refers to the greatest number that can completely divide the given
numbers without leaving a remainder. It works synonymous with 'greatest common
factor' or the 'highest common factor.' The lesson, therefore, will deal comprehensively
with how to compute the greatest common divisor.
GCD, in the case of positive integers (a, b), should be defined as the largest positive
number which is a common factor of the two integers considered. It may be seen that
GCD of any two numbers can never be negative or zero since in all the cases the least
positive integer common to those two numbers would be a value of 1.
Let us see the step given below to learn how to find the GCD of two numbers.
Step 01: Write the divisors of the number ‘a’
Step 02: Write the divisors of the number ‘b’
Step 03: List the common divisors of ‘a’ and ‘b’
Step 04: Now find the divisor which is the highest among the common divisor.
Example 1:
Find the greatest common divisor (or GCD) of 128 and 96
Solution:
By the method of prime factorization,
128 = 2 x 2 x 2 x 2 x 2 x 2 x 2
96 = 2 x 2 x 2 x 2 x 2 x 3
Greatest common divisor (128,96) = 2 x 2 x 2 x 2 x 2 = 32
Example 2:
Find the greatest common factor of 24,30 and 36
Part 01.
01.
A. 28 feet in length and 24 feet in width.
Therefore, the largest square that can fit into the entire land area,
So, the minimum number if squared vegetable bed that can be prepared from the land
without wasting any area is 42.
B. To solve part (A), the technique used involves several mathematical steps and
concepts. Primarily focusing on the efficient use of the entire land area without wastage.
Here’s a detailed explanation of the technique.
Greatest common divisor (GCD) the first step is to determine the largest possible square
that can fit evenly into bath the length and the width or the land. This is achieved by
calculation the GCD of the two dimension (28 feet and 24 feet). The GCD represent the
largest length that can divide numbers without leaving a reminder. For 28 and 24 the
GCD is 4 feet can fit into both dimension without any leftover space.
Division after determining the side length of the largest squares (4 feet) the next step is
to calculate how many such squares can fit along the length and width of the land. This
is done by dividing each dimension by the side length of the square. For the length (28
feet), dividing by 4 gives 7 squares for the width (24 feet), dividing by 4 gives 6
squares.
Multiplication to find the total number or squares, multiply the number of squares along
the length by the number of squares along the width. In this case, 7 squares along the
length multiplied by 6 squares along the width quals 42 squares.
LCM
Least Common Multiple (LCM) is a method to find the smallest common multiple
between any two or
more numbers. A common multiple is a number which is a multiple of two or more
numbers.
Example 01:
Example 02:
Prime factorization of 4 = 22
Prime factorization of 5 = 51
Next, I just take highest power of each prime factor from the factorizations:
For 2: highest power is 22
For 3: highest power is 51
02.
A. I have to find the day of the month which all 5 employees will be doing OT together,
finding the LCM of the days on which each employee works overtime.
The employees do OT
Emp 1: 3 days
Emp 2: 4 days
Emp 3: 6 days
Emp 4: 8 days
Emp 5: 12 days
Prime factorization
3 = 31
4 = 22
6 = 21 x 31
8 = 23
12 = 22 x 31
LCM = 23 x 31 = 8 x 3 = 24
All employees are doing OT work 1st day of month.
Next time which day of the month, will all employees do the OT together
1+24 = 25th Day of the month
B.
I applied the method of Least Common Multiple, or LCM, to find the day on
which all 5 employees will work overtime together. The steps are as follows:
2. Find Maximum Powers: I identified the highest power available for each
distinct prime factor within the factorizations.
3. Find the LCM, multiplying these highest powers of the prime factors together
to get the LCM.
4. 24+1 = 25
This process allowed me to find that on the 25th day of the month, all the
employees will be working overtime together.
Part 02
3.
A. Sequence
A sequence is an arrangement of several numbers following a particular pattern.
The variations in numbers appearing in a sequence are referred to as the terms of
the sequence.
Let us I be the index of the terms in the given sequence a1, a2, a3,.., an, … etc.
Here the subscripts denote the order in which the term occurs. i.e.,
The first term = a1
The second term = a2
The third term = a3
……
In the sequence, the term which is at the nth place, is denoted by an, where n is a
positive integer. This term is also referred to as the term of a sequence.
Arithmetic progression
If a sequence follows the arithmetic property, then there exists a fixed number
which is kept constant and is known as the common difference. Now let’s take the
sequence, 1, 4, 7, 10, 13, 16, …
In AP, we will come across some main terms, which are denoted as:
First term (a)
Common difference (d)
Nth term (an)
Sum of the First N terms (Sn)
a, a + d, a + 2d, a + 3d, a + 4d, ………., a + (n – 1) d
Sum of N terms of AP
In the case of an arithmetic progression (AP), one can compute the total of the first n
terms, if one knows the first term, the common difference and the total number of terms.
The formula for the sum of arithmetic progression is detailed below. Let us consider an
AP having “n” number of terms.
Sn = n/2 [2a + (n – 1) x d]
This is the AP sum formula to find the sum of n terms is series.
Formula to Find the Sum of AP when First and last term are given as follows:
S = n / 2 (first term + last term)
03.
A).
B).
In order to find the total number of boxes present in the storage facility, I made use of
the formula for the sum of an arithmetic progression (AP) with the first and the last term
known. Where the top row (1st row) has 21 boxes and bottom row (10th row) has 30
boxes and total number of rows is 10, I was able to find out the series of boxes in each
row.
Sn = n / 2 (a + l)
Sn = sum of the first n terms
a = first term
l = Last term
n = total number of terms
in this case
Sn = 10 / 2 (21 + 30)
= 5 x 51
= 255
total number of boxes stored in the warehouse is 255.
This approach is quite effective since it makes easy the exercise of measuring the total
of the numbers in a straightforward progression. After identifying the connection of the
rows and using the right equation, I managed to find the total easily without counting
the boxes in every row. This method describes how algebraic equations can be applied
to real life situations involving patterns, which is useful not only in academics but also
in the field.
4.
A.
Geometric Progression
A Geometric Progression (GP) is a sequence of numbers in which the ratio between any
two consecutive terms is always constant. It is represented by:
t (time) = 6 years
A (final amount) = calculate the answer.
And now,
The relevant values are replaced after that calculate the answer.
Part 03
1. Multiplicative inverse in modular arithmetic
The multiplicative inverse of a given value, N, is denoted by 1/N or N-1. It is also
referred to as reciprocal which comes from the Latin word ‘reciprocals’. Inverse means
the contrary of something. The reciprocal
of obtained number is that when multiplied with the number gives the value 1. To put it
another way, it means to divide a value by itself in order to achieve 1 as in N/N = 1.
When a number is multiplied by its own multiplicative invers, the result is equal to 1.
Consider the examples; the multiplicative inverse of 3 is 1/3, of -1/3 is -3, of 8 is 1/8 and
4/7 is -7/4. But the
multiplicative inverse of 0 is infinite because 1/0 = infinity. So, there is no reciprocal for a
number ‘0’. Whereas the multiplication inverse of 1 is 1 only.
1 / x or x – 1 (inverse of x)
For example, the multiplicative inverse of 3 is 1/3, of 47 is 1/47, 13 is 1/13, 8 is 1/8, etc.,
whereas the
reciprocal of 0 will give an infinite value or 1/0 = ∞. Now to check whether the inverse of
a number is
correct or not, I can perform the multiplication operation, such that;
3 x 1/3 = 1
47 x 1/47 = 1
13 x 1/13 = 1
8 x 1/8 = 1
Hence, I can see in all the above four cases I get the identity number 1. So, it is proved.
Method 1: For the given two integers, say ‘a’ and ‘m’, find the modular multiplicative
inverse of ‘a’ under
modulo ‘m’.
The modular multiplicative inverse of an integer ‘x’ such that.
ax ≡ 1 ( mod m )
The value of x should be in the range of {0, 1, 2, … m-1}, i.e., it should be in the ring of
integer modulo m.
Note that the modular reciprocal exists, that is, “a modulo m” if and only if a and m are
relatively prime.
GCD (a, m) = 1.
Method 2 : If a and m are coprime, multiplicative inverse modulo can also be found
using the Extended
Euclidean Algorithm
From the Extended Euclidean algorithm that takes two integers to say ‘a’ and ‘b’, finds
their GCD and also
finds ‘x’ and ‘y’ such that
ax + by = GCD (a, b)
To find the reciprocal of ‘a’ under ‘m’, substitute b = m in the above formula. We know
that if a and m are
relatively prime, the value of GCD is taken as 1.
ax + my = 1
Take modulo m on both sides, and we get
ax + my = 1(mod m)
I can remove the second term on the left side as ‘my (mod m)’ because, for an integer, y
will be 0. So it
becomes,
ax ≡ 1 (mod m)
So, the value of x can be found using the extended Euclidean algorithm, which is the
multiplicative inverse
of a.
It is mostly used in equations for simplifications. Mostly it is used for cancellation of the
terms. Remember
that if I want to find the multiplicative inverse of a number, then take the reciprocal of a
number.
1. Cryptography
In situations involving the encryption of messages, people utilize public key
cryptography-a process which depends on the use of prime numbers, like RSA (Rivest-
Shamir-Adleman). For example, these consist of two large random prime numbers whose
product is the public key. The security of the RSA relies on the difficulty of coming up
with the prime factors from a large composite number. That is where its one-way function
comes in to assure secure communication over nonsecure channels.
Key creation involves entering these big random prime numbers of which it is generated.
The bigger and more random the primes, the harder for attackers to break in.
2.Hashing algorithms
Mostly, Prime hash functions provide relatively uniform distribution of values across the
possible values of the hash. A prime number has been known to provide an arm of
development when used as the size of a hash table, thereby reducing hash collisions that
generally occur in the case of multiple inputs giving the same hash values. Fewer
collisions make systems fast and provide performance efficiencies.
Load Balancing: In data distribution across nodes of the distributed nodes, prime hash
functions can help in distributing loads across the servers. By utilizing the principles of
primes to distribute data, the systems can avoid bottlenecks and optimally utilize their
resources.
Polynomial Hashing - In some data structures, particularly hash tables, the technique of
polynomial hashing usually uses prime coefficients to minimize the chances of two keys
colliding, thus increasing effectiveness.
The prime numbers discovered by Eratosthenes. And he took the example of a sieve to
filter out the prime number from a list of natural numbers and drain out the composite
numbers.
For using this method positive integers from 1 to 100, circling the prime numbers, and
putting a cross mark on composite. This kind of activity refers to the sieve of
Eratosthenes.
The first ten primes are 2, 3, 5, 7, 11, 13, 17, 19, 23, 29.
Prime numbers are important in the field of computing.
Two large prime numbers are picked and multiplied together to create a modulus.
The public key is derived from this modulus, and it can be shared openly.
The private key, however, uses these prime factors of this modulus to keep it
secret.
The real reason for trouble in breaking RSA encryption is that the computational
dehydration of very large numbers (large enough for about hundreds of hexadecimal
digits long) into their primes is infeasible with current technology. This mechanism
guarantees data confidentiality, integrity, and authenticity, such as secure
communications like SSL/TLS, VPNs, and encrypted emails.
Activity 02
Part 01
01. Probability
Probability measures the occurrence of an event. An event's occurrence cannot be foretold
with certainty in most cases. Using probability, one can only assess the chances or
likelihood of an event occurring. The scale runs from 0 to 1, the former being impossible
and the latter certain. Class 10 Probability is an area important for these learners wherein
all the basic concepts relating to this topic will be explained. The probabilities of all the
outcomes in the sample space add up to one.
For example
School have a class of 100 student
45 students Basketball players
30 students football players
15 students both sports players
If student want to find the probability that a student plays football given that they play
basketball,
P (football, basketball) = P (football and basketball) / P (basketball)
= 15/100 ÷ 45/100
= 15/45
= 1/3 (0.33)
If student randomly select a student who plays basketball there is a 33% chance, they
play football.
Independent event
When it comes to probability theory and events being independent of each other it
means that the outcome of one event doesn't impact the outcome of the event in any
way. Furthermore stated; regardless if one event happens or not the likelihood of the
event occurring stays constant. In terms of mathematics. Events A and B are considered
independent if;
P (A ∩ B) = P (A) × P(B)
Consider an example of rolling a die. If A is the event the number appearing is odd and
B be the event the number appearing is a multiple of 3,
Also, A and B in the event the number appearing is odd and a multiple of 3
P (A ∩ B) = 1/6
P(A│B) = P (A ∩ B)/ P(B)
=1/61/3=1/2
P (A) = P (A│B) = 1/2, which implies that the occurrence of event B has not affected
the probability of
occurrence of the event A.
P (A ∩ B) = P(B). P (A)
Probability Tree
The tree diagram plays a key role in organizing and showing different possible results. It
has two main parts: branches and ends. You'll find the chance of each branch written on
it, while the ends hold the final result. People use tree diagrams to work out when they
need to multiply and when to add. Take a look at the tree diagram for the coin below:
Conditional probability
When an event B related to event A has already happened, the chance of event A
occurring is called conditional probability. We show this as P(A|B).
The picture above shows the sample space S with two events A and B. If event B has
already taken place, our sample space S shrinks to just B. This happens because now,
any event can occur within B. To work out how likely event A is to happen, we need to
look at the part that A and B share. This shared area is where A and B overlap, which
we write as A ∩ B.
This idea explains conditional probability: how likely one event is to
occur when another related event has already happened. When two
events cross paths, the formula that shows the likelihood of both
happening together goes like this:
P (A|B) = N (A∩B) /N (B)
Or
P (B|A) = N (A∩B) / N (A)
Where P(A|B) represents the probability of occurrence of A given B has occurred.
N (A ∩ B) is the number of elements common to both A and B.
N (B) is the number of elements in B, and it cannot be equal to zero.
Let N represent the total number of elements in the sample space.
Since N (A ∩ B)/N and N(B)/N denotes the ratio of the number of favorable outcomes to
the total number
of outcomes; therefore, it indicates the probability.
N (A ∩ B)/N can be written as P (A ∩ B) and N (B) / N as P (B).
P (A|B) = P (A ∩ B) / P (B)
P (A ∩ B) = P (B) P (A|B) if P (B) ≠ 0
= P (A) P (B|A) if P (A) ≠ 0
Similarly, the probability of occurrence of B when A has already occurred is given by,
P (B|A) = P (B ∩ A) / P (A)
02.
A).
03.
A).
b).
c.
04.
A).
Figure 15 Activity 02, Part 01, 04. (b), (c) answer
B).
C).
Part 02.
05.
Random Variable
A random variable is a rule for assigning a number to each outcome in a sample space.
Random variables can be either discrete or continuous. A random variable is said to be
discrete if it takes only a few values in an interval. Otherwise, it is continuous. We
generally denote the random variables with capital letters such as X and Y. It is said to be
a discrete random variable when X takes values 1, 2, 3, ….
Variate
The random variable can be generalized to a variate. It possesses all the properties of a
random variable in general, without stressing any probabilistic experimentation. It obeys
a particular probability law.
A variate is called discrete variate when that variate is not capable of assuming all
the values in the
provided range.
If the variate can assume all the numerical values provided in the whole range,
then it is called
continuous variate.
on. In a nutshell, the probability distribution of a random variable lists the probabilities
for each possible outcome, and this distribution is known as the probability mass
function.
In an analysis, let a person be selected at random and the person's height be represented
by a random variable. Logically the random variable is defined as a function which
maps the person to the person's
height. It is now, the random variable, a probability distribution such that it is possible to
compute the probability that height lies in any subset of possible values, such as the
probability of height lying between 175 to 185, or the probability that lies below 145 or
above 180. Now, another random variable can be the age of the same person lying
between 45 years and 50 years or below 40 years or above 50 years.
A continuous random variable is formally defined such that its cumulative distribution
function is constant
There are no "gaps" between that would be compared to numbers that only have a
limited probability of occurring. Alternatively, these variables almost never take an
exactly prescribed value c, but there is a positive probability that its value will rest
intervals which can be very small.
07.
A).
B).
C).
Part 03
8).
A).
B).
C).
Empirical Rule
That would be what, in statistics, is called the empirical rule. The 68-95-99 rule states
that, for normal distributions, 68% of the observed data points will lie within one
standard deviation of the mean and 95% inside two standard deviations. deviations, and
99.7% will occur within three standard deviations.
Thanks to the empirical rule the mean and standard deviation become extra useful when
you have reason to believe that your data are approximately Normally distributed.
Knowing just these two statistics enables you to Calculate the probabilities and
percentages for different outcomes.
This is known as the empirical rule because empirical research relies upon observation
and measurement of real-world outcomes, rather than theory. In other words, empirical
translations mean it is based upon practical reality. The empirical rule takes the recorded
outcomes and enables you to use them to make predictions and find probabilities.
Besides that, statisticians sometimes refer to the empirical rule as a three-sigma rule
because nearly all the observations may fall within three standard deviations. The three-
sigma rule forms a basis for both the upper and lower limits of a statistical control chart.
This limit, in general, becomes helpful in identifying the outliers since 99.7 percent of
all the values ought to fall within it.
This is the empirical rule graph of the standard normal distribution showing the ranges
and the percents.
Z-score
Formula
Explanation
x = individual value
μ = mean
σ = standard deviation
Figure 23 Activity 02, Part 03, Q. 09 Answer and Q. 10 Answer
09.
10.
A).
Figure 24 Activity 02, Part 03, 10 Answer
B).
C).
D).
Importance:
Randomized load balancing algorithms select multiple random servers to distribute the
incoming requests. One of the well-known algorithms is Random Selection Algorithm,
where each new request is assigned to a randomly selected server.
Importance
Scalability: This allows systems to scale efficiently by using probability-based load
balancing, which will dynamically distribute the load across available resources. This
ensures that no server gets saturated by requests, therefore improving the performance
and reliability of a system.
- Fault Tolerance: Probability-based load balancing may, apart from that, result in fault
tolerance. Due to the random distribution of requests to the different servers, the system
becomes less vulnerable against the failure of any one of them as the workload is
distribute between several servers.
Conclusion: It turns out that probability is still applied in various important aspects of
hashing and load balancing in computing. It allows for efficient and scalable systems,
providing insight into the behavior to be exhibited by hash functions in workload
distribution, resource utilization, and optimization.
Understanding and leveraging probabilistic techniques stand out as prime milestones
toward building robust high-performance computing.
Activity 03
Part 01
01.
03.
Part 02
04.
Q
05
05. Q
06.
06. Q
Activity 04
Part 01
01.
I. To determine the slope of the function f(x) = 4x3 + 5x4 – 9x + 2, we need to take
the derivative of the function with respect to x.
II.
To determine the slope of the function f(x) = sin(3x) – 5x3 – 7, we need to take the
derivative of the function with respect to x.
f(x) = sin(3x) – 5x3 – 7
Taking the derivative of f(x) with respect to x, we get:
02.
03.
Figure 36 Activity 0, Part 02, Q. 03 Answer
03. Q
04.
Figure 37 Activity 04, Part 02, Q. 04 Answer
05.