Edward Hernandez
9/21/2015
School of Electronics Technology
1. (35 points) the following formula estimates the number of smartphone users, in millions,
since 2010. Assume this trend continues, and use the following formula to find the
projected amount of
MA1310: Module 4 Applications of Trigonometry
Exercise 4.1
Laws of Sines and Cosines
Edward Hernandez
A =48
=
C =97
a =12
1. Use the values given in the above triangle and find the value of B, b, and c.
a
b
c
=
=
sinA sinB sinC
12
c
12sin 97
=
=
=c=16.03
Edward Hernandez
11/11/15
This is wrong because they forgot to add the +1 to the 54
() = 2 12 + 42 () = 1
( 1) = ( 1) 2 12( 1) + 42
( 1) = 2 2 + 1 12 + 12 + 42
( 1) = 2 14 + 54
This is how it looks when its correct a
() = 2 12 + 42 () = 1
( 1) = ( 1) 2 12
1. (10 points) What test can we use to determine if a graph is a function or not? Explain in
your own words.
The best test to see if a graph is a function is the vertical line test. This means seeing if every x
has only one y. Also, the graph has to be co
Edward Hernandez
Objectives 3.1
1. Recognize characteristics of parabolas.
2. Graph parabolas.
3. Determine a quadratic functions minimum or maximum value.
4. Solve problems involving a quadratic functions minimum or maximum value.
Objectives 3.2
1. Ident
1. (30 points) You have 150 yards of fencing to enclose a rectangular region. One
side of the rectangle does not need fenced.
a. Write the equation for area. A = X * Y
b. Write the equation for the fencing. 150 = 2X+ Y
c. Solve the equation for fencing fo
Edward Hernandez
10/11/15
Problem 7
The problem I choose is #7 it the mistake they made in this problem is
they didnt do there subtraction right 121 55 is not 68 it is 66 and when
they divide it came out to 34 it should be 33 I will show you the correct
w
1. (10 points) Evaluate
1.5
4
Round your answer to three decimal places.
t
2. (10 points) The formula = C ( 1+r ) models inflation, where
C = The value today
r = The annual inflation rate
S = The inflated value t years from now
Use this formula to solve t
School of Electronics Technology
1. (25 points) The media access control (MAC) address of a network interface is a unique
address. Each network interface relating to its MAC fits the criteria of a function because
each device has its own unique MAC addres
EXERCISE MODULE 3
Edward Hernandez
10/20/2015
1. (30 points) The following quadratic equation describes the average random access
memory (RAM) installed, , in Gigabytes, on PCs t years after 2000. = 0.0222 + 0.25
a. Find the average RAM installed on PCs i
Edward Hernandez
10/20/2015
1. (30 points) we often use graphs of recent data to project what future data may bring.
The following is the graph of a cars value. The car was purchased for $20,000. Each
year, the cars value decreases by $2,800. We can use t
JC Balthazar
Prof. Carter
IS 3345
Discussion 9
Business Anywhere-Security and the Mobile User
1.
From the look of it, looks like the need for communication and email access is the
essential factor here. This can be achieved with the issuing of smart phone
IS3440/Linux Security
Project Part 3 Task 3: Monitor Logs and Baseline
Remote logging allows your system to send important system event information
to a central server dedicated to storing and archiving that data. Keeping a remote copy
of your systems log
IS3440/Linux Security
Project Part 4 Task 1: Design a Backup Plan
Recommended Backup Software
The recommended open source software to use is Bacula. Bacula is a set of
Open Source, computer programs that permit you (or the system administrator) to
manage
IS3440/Security Linux
Project Part 3 Task 2: Recommend a Software Management Plan
For Software management I recommend using RPM package manager. RPM is
is an open packaging system, which runs on Red Hat Enterprise Linux as well as other
Linux and UNIX sys
IS3440/Security Linux
Project Task 3 Part 1: Use A Kernel
First World Bank Savings and Loan's Linux-based infrastructure requires an inhouse custom kernel or a kernel provided by a vendor. Some of the advantages of using
an in-house custom kernel are:
You
IS3440/Linux Security
Project Part 2 Task 2: Secure Web and Dataservers
Scenario
First World Bank Savings and Loan needs to service its customers online with a Web
application using a database that contains highly sensitive information. The Web
applicatio
IS3440/Linux Security
Project Part 2 Task 3: Provide Layered Security
Scenario
First World Bank Savings and Loan requires layered security for its public-facing
Web server. The Web server is a bastion host that uses Secure Sockets Layer (SSL) for
customer
IS3440 Linux Security
Project 1 Task 2: Providing Open Source Server Solutions
Recommended Open source software
MySQL(Database)
MySQL is the world's most popular open source database software. MySQL is an open
source relational database management system.
IS3440/Linux Security
Project 2 Task 1: Secure File Storage Server
Scenario
There is a requirement to read customer confidential data located in the local
area network (LAN) of First World Bank Savings and Loan. The organization needs to
deliver highly co
IS3440 Linux Security
Project Part 1 Task 3: Managing User Accounts
Managing User Accounts
Users will be put into groups; this will be done to control access to the file system.
Putting users into groups will help manage them and better define what they s
IS3440 Linux Security
Project Part 1 Task 1: Online Security Policy
Outline Security Policy
First World Bank Savings and Loan wishes to provide all banking services online
to its customers. These services also include the online use of credit cards for lo
1.
2.
Which fstab option would allow customers to view PDF files without being able to
modify the files?
Describe the process to create a quota hard limit of 2G for a user.
Ans: To configure the quota for a user, execute the command: edquota username. Usi
1.
2.
Which fstab option would allow customers to view PDF files without being able to
modify the files?
Describe the process to create a quota hard limit of 2G for a user.
Ans: To configure the quota for a user, execute the command: edquota username. Usi
8/5/14
MA1210
Michael Ruano
Unit 8 Problem Set
Unit 8 Problem Set
Exercise Set 3.3: (p.350)
In Exercises 1-16, divide using long division. State the quotient, q (x), and the remainder, r (x).
6. (6x3+ 17x2 + 27x + 20) (3x + 4)
In Exercises 17-32, divide u
7/24/14
MA1210
Michael Ruano
Unit 6 Problem Set
Unit 6 Problem Set
Exercise Set 2.6: (pp. 279-280)
In Exercises 1-30, find the domain of each function.
24. f (x) =
In Exercises 31-48, find f + g, f g, fg, and . Determine the domain for each function.
32.
7/19/14
MA1210
Michael Ruano
Unit 5 Problem Set
Unit 5 Problem Set
Exercise Set 2.3: (pp. 239-240)
In Exercises 1-10, find the slope of the line passing through each pair of points or state hat the
slope is undefined. Then indicate whether the line throug
7/7/14
MA1210
Michael Ruano
Unit 4 Problem Set
Unit 4 Problem Set
Exercise Set 2.1: (pp. 210-211)
In Exercises 1-10, determine whether each relation is a function. Give the domain and range for
each relation.
4. cfw_(5,6), (5,7), (6,6), (6,7)
In Exercises
MA1210
Tuesday, PM
Michael Ruano
Analyzing Graphs: Ohms Law
The graph I chose to analyze is Ohms Law because my field of study is Electrical
Engineering. Analyzing the graph, I notice it displays the relevance of voltage and current. At
voltage 5 the curr