![]() |
Quote:
http://en.wikipedia.org/wiki/IEEE_1541 |
It seems like the drive makers, rather than admit that their marketing departments have been over-inflating drive capacities, have found a way to claim that they're right:
From the same Wiki page: Quote:
|
You mention trig functions and sequences and series.
Sin(x) can be expressed as a series: x - (x^3)/3! + (x^5)/5! - ... Similarly, Cos(x) = 1 - (x^2)/2! + (x^4)/4! - ... Both converge briskly because of the factorials, and the first (Sine) is fairly accurate for small angles (in radians) using only the first term. |
Quote:
|
In CS, most engines use FDLIBM's version which is an approximate polynomial of degree 13 on the range 0 to pi/4 with six coefficients since only even powers of x are considered. All other ranges can be found using identities.
Since the exact polynomial converges so quickly, however, not too many terms are required to converge within a given tolerance. Have them figure that out. |
let me add that as far as computers go, usually the logic of a problem is more difficult for students than the actual math. for instance, I run across students (more often than I like) who are capable of understanding fairly sophisticated calculations so long as they are step-by-step, but throw in anything conditional (where they have to keep two potential program flows in mind, as opposed to one actual program flow, or figure out the behavior of a conditional loop) and they get lost. heck, I have students are in a world of hurt trying to parse out a phrase like:
if ((var1<var2 && var2<var3) || var1>var3) ... they just don't seem to be able to track the ORs and ANDs. maybe get them to program a craps game - not too difficult, good conditionals and some basic statistics, and they'll find it entertaining... :) |
Here's one you could create lots of variations on:
If the probability of making a coding error is XX per hour of programming, and the probability that any given error will not be detected until after the final release is YY, how many undetected errors can be expected in an application that required ZZ man-hours of programming? You could also do something similar with network security: If a hacker with a certain skill level can expect to find XX flaws in YY hours of searching, and the probability of a flaw being exploitable is ZZ, what are the odds that they will find an exploitable flaw if they pull an all nighter? That ought to hold their attention. ;) |
the programming one and the hacker problems are good examples and a good use of probability. Thanks...
|
I want to thank everyone for their advice on math examples. The students really love the computer examples that involve summation and permutation in relationship to networking. I will be teaching the same course next quarter so if you have examples or come up with examples, please post so that I have them available for them. It is really appreciated.
|
| All times are GMT -5. The time now is 03:06 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.