subject

[MATLAB] Manipulate a matrix G =
[1 2 1 0 0 0 0
3 4 0 1 0 0 0
1 0 1 2 1 3 1
0 1 2 7 -1 2 1]
Manipulate a matrix: Do the following operations on matrix G created above in Problem 6.
(a) Extract the rst 3X3 submatrix from G and store it in the matrix H, that is, create a matrix
H =
[1 2 1
3 4 0
1 0 1]
by extracting the appropriate rows and columns from the matrix G.
(b) Create the matrix E obtained from H by replacing Hsub22 = 4 by 7. Do not enter E explicitly.
Hint: enter rst E=H; to create copy of the matrix H and then manipulate the matrix E. The
resulting matrix should be
E =
[1 2 1
3 7 0
1 0 1]
(c) Create the matrix F obtained by deleting the third column of the matrix H. Do not enter F
explicitly.
(d) What happens if you type G(:,:) and hit return? Do not include the output in your lab
report, but include a statement describing the output in words.
What happens if you type G(:) and hit return? Do not include the output in your lab report,
but include a statement describing the output in words.
(e) What happens if you type G(5,2) and hit return? Explain.
(f) What happens if you type max(G)? Explain. What happens if you type sum(G)? Explain.
(g) What happens if you type G(G>3) and hit return? Can you explain how MATLAB got that
answer? What happens if you type G(G>3) = 100 and hit return? Can you explain how
MATLAB got that answer?

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 13:30, ReaLily
1. technician a says horsepower information can be used by consumers to compare the power of different automobile engines. technician b says that manufacturers will often list the horsepower output of their engines in the online service information. who is right?
Answers: 2
image
Computers and Technology, 22.06.2019 14:40, davidb1113
You begin your first day of responsibilities by examining the recent is security breach at gearup to get ideas for safeguards you will take. at gearup, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. what kind of computer crime did gearup face?
Answers: 3
image
Computers and Technology, 22.06.2019 21:10, itsmichaelhere1
Dameas communication challenge is due to which factor
Answers: 2
image
Computers and Technology, 23.06.2019 19:30, Felixthecat7186
Anul 2017 tocmai s-a încheiat, suntem trişti deoarece era număr prim, însă avem şi o veste bună, anul 2018 este produs de două numere prime, 2 şi 1009. dorel, un adevărat colecţionar de numere prime, şi-a pus întrebarea: “câte numere dintr-un interval [a, b] se pot scrie ca produs de două numere prime? “.
Answers: 3
You know the right answer?
[MATLAB] Manipulate a matrix G =
[1 2 1 0 0 0 0
3 4 0 1 0 0 0
1 0 1 2 1 3 1
...

Questions in other subjects:

Konu
Mathematics, 29.08.2019 11:50
Konu
Physics, 29.08.2019 11:50