Python Programming: An Introduction to Computer Science
3rd Edition
ISBN: 9781590282779
Author: John Zelle
Publisher: Franklin Beedle & Associates
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 1, Problem 4D
Explanation of Solution
Storing values in the computer:
- The computer will not store the exact values of certain numbers. Rather they store an approximate value.
- For example, the value 0.1 might be stored as 0.10000000000000000555 and in certain situations the approximate values do not create any problems.
- The chaotic behaviour exhibits unpredictability and extreme sensitivity of the initial values.
- If the computer takes approximate values without giving importance to exact value, it might pose problem.
Areas where the chaotic behaviour poses problem:
When trying to multiply a number with larger number...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is Benford’s Law?
Benford’s Law involves looking at the first digit of a series of numbers. For example, suppose that you were to use a random number generator to generate integers in the range of 100 to 999 and you looked at how often the number begins with 1, how often it begins with 2, and so on. Any decent random number generator would spread the answers out evenly among the 9 regions, so we’d expect to see each digit about one-ninth of the time (11.1%). But with a lot of real-world data, we see a very different distribution.
The expected distribution under Benford’s Law is shown below:1: 30.1%, 2: 17.6%, 3: 12.5%, 4: 9.7%, 5: 7.9%, 6: 6.7%, 7: 5.8%, 8: 5.1%, 9: 4.6%
You should use this distribution in your program. You are being provided with a text file giving population data for 247 countries and territories. Your program should read in the data in this file and extract the information needed to keep count of how often each first digit is found. It may be useful to know…
Bob and Alice want to send each other secret messages that no one else will have access to. They have decided that they will use a locked box to hold the secret messages, and they will drop the box off in each other’s mailboxes. The problem is that if they use a combination lock, they will have to send the combination to the box and someone might intercept it. Here are the materials they have access to:
A box that can be locked with a combination lock
Two combination locks (the kinds that click shut that you might use on a school locker)
Paper
Pencil
Describe a protocol Bob and Alice can set up to deliver these messages securely.
Suppose you are going to simulate GPS positioning using 4 satellites. You are going to pretend to be a GPS receiver somewhere on the map and will figure out where you are based on the 4 “signals” you receive. But for you (and for a GPS receiver) all those signals tell you is where the satellite was when it sent the signal, and how long it took for the signal to get from the satellite to you. You need to determine where you could be (Mention distance in terms of grunters chain), based on that amount of time elapsed. The speed of light (R) is 299,792,458 m / s. You need to account for the scale factor of the map. This map has a scale factor of 1:21,283,839. This means that 1 meter on the map equals 21,283,839 meters on the earth’s surface. A = .00415783 seconds B = .00400006 seconds C = .00837010 seconds D = .00712225 seconds
Chapter 1 Solutions
Python Programming: An Introduction to Computer Science
Ch. 1 - Prob. 1TFCh. 1 - Prob. 2TFCh. 1 - Prob. 3TFCh. 1 - Prob. 4TFCh. 1 - Prob. 5TFCh. 1 - Prob. 6TFCh. 1 - Prob. 7TFCh. 1 - Prob. 8TFCh. 1 - Prob. 9TFCh. 1 - Prob. 10TF
Ch. 1 - Prob. 1MCCh. 1 - Prob. 2MCCh. 1 - Prob. 3MCCh. 1 - Prob. 4MCCh. 1 - Prob. 5MCCh. 1 - Prob. 6MCCh. 1 - Prob. 7MCCh. 1 - Prob. 8MCCh. 1 - Prob. 9MCCh. 1 - Prob. 10MCCh. 1 - Prob. 1DCh. 1 - Prob. 2DCh. 1 - Prob. 3DCh. 1 - Prob. 4DCh. 1 - Prob. 5DCh. 1 - Prob. 1PECh. 1 - Prob. 2PECh. 1 - Prob. 3PECh. 1 - Prob. 4PECh. 1 - Prob. 5PECh. 1 - Prob. 7PE
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Correct answer will be upvoted else Multiple Downvoted. Computer science. You need to change this grouping so all components in it are equivalent (I. e. it contains a few events of a similar component). To accomplish this, you pick some integer x that happens to some extent once in a, and afterward play out the accompanying activity quite a few times (perhaps zero): pick some portion [l,r] of the arrangement and eliminate it. Yet, there is one special case: you are not permitted to pick a fragment that contains x. All the more officially, you pick some adjoining aftereffect [al,al+1,… ,ar] to such an extent that ai≠x if l≤i≤r, and eliminate it. After expulsion, the numbering of components to one side of the eliminated portion changes: the component that was the (r+1)- th is presently l-th, the component that was (r+2)- th is currently (l+1)- th, etc (I. e. the leftover arrangement simply falls). Note that you can not change x after you picked it. For instance, assume n=6,…arrow_forwardFor your initial post, identify a single algorithm that you use in your day to day life which involves repetition. As an example, washing each dish in a stack of dishes or a walk/don't walk sign switching from one mode to another after a set amount of time. Detail the steps of your algorithm in your post. As you detail the steps, make sure you break down each step fully. At a high level, explain how you would go about implementing the loop. Would you implement a while loop? A for loop? Would you make use of a "break statement?" Would your solution involve a nested loop?arrow_forwardIn programming, we use the mask concept to indicate information that can be shown to the user and information that must be “masked”, that is, hidden. In an implementation of a hangman game, we use a mask to indicate which secret word positions the player has already guessed right (whose the contents must therefore be shown to the player), and which positions must remain hidden. Each time that the player hits a letter of the hidden word, the mask is updated so that it has little dashes in the places of letters that the player has not hit yet and show it, in their proper place, the letters that he already hit it. For example, if the word is "cards", the current mask is: - a - - s and the player guesses the letter "d", the mask should be updated to: - a - ds.Write a function called update_mask that takes as input a string containing the word secret (in the example above, this word would be “cards”), a list whose elements are the characters of the current mask (in the example above…arrow_forward
- Abstract: the main purpose of this experiment is build real time system using PPI 8255 to control devices connected to. Problem description: assume that there are two devices are connected to port A and two sensors are connected to port B of PPI 8255. They work according to the following table Sensors (S1S2) Devices (DID2) 00 01 01 10 10 11 11 00 Write a program to control these two devices according to the values of sensors.arrow_forwardA quaker was walking down a country road when he was suddenly confronted by a robber brandishing a pistol. The robber exclaimed, "Your money or your life!" My friend replied, "I cannot deliver my money because I should be aiding thee in evildoing, but exchange is lawful, and I will give thee my purse for the pistol." The thief consented to accept the purse, then the quaker pointed the gun to the robber's head and said, "Now buddy, give me back my pocketbook or the weapon may go off fire," according to the robber.arrow_forwardSuppose you’re consulting for a bank that’s concerned about fraud detection, and they come to youwith the following problem. They have a collection of n bank cards that they’ve confiscated, suspectingthem of being used in fraud. Each bank card is a small plastic object, containing a magnetic stripe withsome encrypted data, and it corresponds to a unique account in the bank. Each account can have manybank cards corresponding to it, and we’ll say that two bank cards are equivalent if they correspond to thesame account.It’s very difficult to read the account number off a bank card directly, but the bank has a high-tech “equivalence tester” that takes two bank cards and, after performing some computations, determines whether theyare equivalent.Their question is the following: among the collection of n cards, is there a set of more than n/2 of themthat are all equivalent to one another? Assume that the only feasible operations you can do with the cardsare to pick two of them and plug them…arrow_forward
- Write a matlab/python code. Given the price from Dec 2020 to Nov 2021: 20201231 49.32 20210131 53.97 20210228 60.37 20210331 63.95 20210430 62.32 20210531 66.01 20210630 70.96 20210731 72.88 20210831 68.91 20210930 72.24 20211031 81.22 20211130 79.80 Estimate the price for January 2022 using a Newton interpolating polynomial.arrow_forwardA computer science professor has bought his two children a box of raisin cookies for thanksgiving. The number of raisins in the cookies is not evenly distributed and each cookie can have as many raisins in it. The children love raisins very much and when they open the box they fight over having as many raisins possible. They do not care about the number of cookies they have but rather the total number of raisins they collected. They are not happy with what they have collected, because each of them thinks the other one has more raisins. So they come back to their father for help. The professor comes up with a dynamic programming algorithm to find whether it is possible to, without breaking any cookie, assign all of them to his children where each gets an equal number of raisins. As mentioned it is not important if one of them gets more cookies. The total number of raisins is T and the total number of cookies is n. Write down a dynamic programming algorithm with O(nT) time complexity…arrow_forwardWe analyzed a program which was supposedly used for cracking some cryptographic algorithms. During the investigations we determined that the program input size can be varied in a wide range and for N-bit input the program result is also always N bit long. Additionally we found that the program working time depends significantly on input length N, especially when N is greater than 10-15. Our test also revealed, that the program working time depends only on input length, not the input itself. During our tests, we fixed the following working times (with an accuracy of one hundredth of a second): N=2-16.38 seconds N = 5-16.38 seconds N = 10-16.44 seconds N=15-18.39 seconds N=20-1 minute 4.22 seconds We also planned to test the program for N=25 and N = 30, but for both cases the program didn't finish within half an hour and was forced to terminate it. Finally, we decided for N= 30 to not terminate the program, but to wait a little bit longer. The result was 18 hours 16 minutes 14.62…arrow_forward
- Abstract: the main purpose of this experiment is build real time system using PPI 8255 to control devices connected to. Problem description: assume that there are two devices are connected to port A and two sensors are connected to port B of PPI 8255. They work according to the following table Devices (DID2) 01 10 Sensors (S1S2) 00 01 10 11 11 00 Write a program to control these two devices according to the values of sensors. Each group should submit a zip file which contains the following files Code file: (assembly language code) - Simulation file Report (pdf file) (details of every single step in the code, also what have you learned from this experiment)arrow_forward2. The computer in mars has a fivenary memory - that is each location can hold a frit value, with a frit holding 0, 1, 2, 3, or 4. How many frits are needed to hold a 6-octal_bit number. Give an expression for the number of frits to hold n octal bits.arrow_forwardA 2D matrix can be represented as a list and a column count value in Python. For example, the 3x3 matrix 1 2 34 5 67 8 9 can be row-wise represented as ([1,2,3,4,5,6,7,8,9], 3), where the number 3 represents the number of columns in the matrix. Similarly, 1 3 52 4 6 becomes ([1,3,5,2,4,6], 3). A submatrix can be defined as an (l,r,t,b) tuple, where l and r are left and right column indices, and t and b are top and bottom row indices (all inclusive). Write a function that takes a tuple containing the list representing a matrix, and the column count of the matrix, along with another tuple representing a specific submatrix, and returns the list representation of the submatrix along with its column count as a tuple. For example, given submatrix(([1,2,3,4,5,6,7,8,9,10,11,12], 4), (1,2,0,1)) returns: ([2,3,6,7], 2) because, ([1,2,3,4,5,6,7,8,9,10,11,12], 4) represents: 1 2 3 45 6 7 89 10 11 12 and (1,2,0,1) represents the submatrix between column indices 1 and 2 (both inclusive), and row…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Computational Software for Intelligent System Design; Author: Cadence Design Systems;https://www.youtube.com/watch?v=dLXZ6bM--j0;License: Standard Youtube License