Ignou Group
Home
Ask a Question
Java Programming
C Language
C# Language
Data Structure
Database (MSSQL, MYSQL)
Practicals
Assignments
MCA 1st Sem
MCA 2nd Sem
MCA 3rd Sem
MCA 4th Sem
MCA 5th Sem
Question Papers
Contact
Evaluate the determinant given below, where π is a cube root of unity ?
posted by
,
on
12:27 PM
,
No Comments
Evaluate the determinant given below, where π is a cube root of unity.
1 π π2
π π2 1
π2 1 π
Newer Post
Older Post
Home
0 ΰ€िΰ€ͺ्ΰ€ͺΰ€£िΰ€―ाँ:
Post a Comment
Search By Course Code
BTemplates.com
Blog Archive
►
2023
(163)
►
December
(1)
►
November
(153)
►
October
(1)
►
September
(7)
►
January
(1)
►
2022
(253)
►
July
(6)
►
June
(93)
►
May
(100)
►
April
(22)
►
March
(22)
►
February
(10)
►
2021
(58)
►
October
(1)
►
July
(2)
►
June
(4)
►
March
(19)
►
February
(32)
►
2020
(4)
►
November
(1)
►
September
(3)
▼
2018
(334)
▼
August
(135)
Write a shell script which will help network admin...
Write steps to configure DHCP on Windows server.
Configure IPsec policy on local computer. Also ena...
Write the commands on Linux/Unix to perform the fo...
What encryption function is used by Windows 2000 o...
What is backup? What are the strategies followed i...
Write a shell script that searches the file conten...
Explain the purpose and features of registry manag...
Why is the audit view limited to specific users on...
Compare the security features/mechanism of Windows...
Explain the role and importance of following tools...
Explain the advantages and disadvantages of differ...
Discuss the tasks performed by LinuxConf package.
Discuss the Users' Administration in WINDOWS 2000....
List the important components of domain name serve...
Compare the role and responsibilities of user mode...
Write the purpose of VPN and name the VPN technolo...
List the main contents of Password files and where...
What are Wallet based payment systems. Give some e...
Give examples of some exclusive M-Commerce portals...
Write and run (using appropriate calling program) ...
Write and run following programs using 8086 assemb...
Design a two bit counter circuit that counts from ...
Write an interactive program which prompts the use...
Explain distributive laws of Boolean Algebra.
Explain addition theorem in probability, with exam...
What are Demorgan’s Law? Explain the use of Demorg...
Explain whether function: f(x) = x 2 posses an in...
Explain inclusion-exclusion principle with example.
Give geometric representation for followings:
What is power set? Write power set of set A={1,2,3...
Show whether √11 is rational or irrational.
Explain principle of multiplication with an example
How many ways are there to distribute 10 district ...
Explain whether (P ∧ Q) → (Q → R) is a tautology o...
Show using truth table whether (P ∧ Q ∨ R) and (P ...
How many words can be formed using letter of DEPAR...
Explain the basic properties of sets.
What is equivalence relation? Explain use of equiv...
There are two mutually exclusive events A and B wi...
How many different committees can be formed of 10 ...
What is relation? Explain properties of relations ...
What is proper subset? Explain with the help of ex...
What is dual of a boolean expression? Explain with...
Draw logic circuit for the following Boolean Expre...
What are different methods of proof? Example with ...
Write the following statements in the symbolic form.
What are conditional connectives? Explain with exa...
Obtain the truth value of disjunction of “ Water i...
Draw a Venn diagram to represent followings: i)...
Make truth table for followings: i) p→ (~ q ∨ ...
You are the General Manager (Human Resource Develo...
Every Diwali a company gives its customers gifts r...
The following sentences are in the passive voice. ...
Here is a phone conversation. Fill in the blanks w...
You are Divya/Vishwas. You have just completed you...
Write a paragraph in about 150 words on any one of...
Write a letter introducing your company to a prosp...
How should a manager begin writing a marketing plan?
Good marketing procedures would allow a manager
Why are marketing plans not written down by many m...
Pick one from the options given against each quest...
Find words from the passage which mean the same as...
Give a title to the passage. Say why you chose it.
Who, according to the passage, is an effective mar...
Marketing research is still to be fully exploited ...
Why do you think market planning is not calculated...
Read the passage carefully and answer the question...
Explain the following in the context of 8086 Micro...
Write a program using 8086 assembly Language (with...
Write a program using 8086 assembly Language (with...
A RISC machine has 128 registers out of which 32 r...
Explain the reasons of reducing complexity in a RI...
Explain the structure of Control Unit with the hel...
Assume that you have a machine as shown in section...
A computer has a single core processor having 8 Ge...
Explain the following giving their uses and advant...
Assume that a disk has 1000 tracks with each track...
What is the need of DMA in a Computer? How is DMA ...
A computer has 1 MB RAM and has a word size of 16 ...
A RAM has 1M rows each having 16 cells.
What is floating point number? What is the differe...
Design a two bit down counter (a sequential circui...
What is the need of a parity bit? Explain with the...
Design a circuit for the following function: F(A, ...
Perform the following conversion of numbers:
What are fixed point numbers in a computer system?...
Write an interactive C program for each to illustr...
Write a C program to take a list of N numbers, sep...
Write an interactive C program to calculate the st...
Write a C program to perform the following operati...
Write a program to generate Fibonacci series using...
Write a C program to generate the following pattern.
Write an algorithm and its corresponding C program...
Write an algorithm, draw a flow chart and write it...
Locate, download and analyze information online on...
Design a flyer for exhibition of paintings. Use di...
Use a Mail Merge feature to send a letter to all y...
Perform the following procedures in Excel and comp...
Create a rule which allows all high priority mails...
►
May
(3)
►
March
(196)
►
2017
(575)
►
August
(172)
►
February
(402)
►
January
(1)
►
2016
(136)
►
December
(12)
►
November
(7)
►
October
(23)
►
September
(27)
►
August
(5)
►
July
(1)
►
June
(4)
►
May
(2)
►
April
(25)
►
March
(18)
►
February
(8)
►
January
(4)
►
2015
(51)
►
December
(7)
►
November
(19)
►
October
(25)
Popular Posts
What are concurrent transactions ? Briefly discuss the problems encountered by concurrent trans
When multiple transaction execute concurrently in an uncontrolled or unrestricted manner, then it might lead to several problems. These pr...
Define classful addressing and discuss problems associated with it.
IP address is an address having information about how to reach a specific host, especially outside the LAN. An IP address is a 32 bit uniqu...
Discuss the following types of testing techniques :(i) Black Box testing
The black box is a powerful technique to check the application under test from the user’s perspective. Black box testing is used to test t...
Discuss the Users' Administration in WINDOWS 2000. What are the different types of user groups supported by Windows 2000?
Discuss the Users' Administration in WINDOWS 2000. What are the different types of user groups supported by Windows 2000? Discuss the s...
Discuss the following types of testing techniques : White Box testing
7 Different Types of White Box testing techniques | White box Testing Tools White box testing is one of the popular kind, which has attrac...
List and discuss the importance of various types of feasibility studies.
Types of Feasibility Study in Software Project Development Feasibility Study in Software Engineering is a study to evaluate feasibility...
Discuss the tasks performed by LinuxConf package.
Difference between Random Sampling and Non-random Sampling
Random Sampling 1-Random sampling is a sampling technique where each sample has an equal probability of getting selected 2-Random sampling...
Describe features of Java programming language
The prime reason behind creation of Java was to bring portability and security feature into a computer language. Beside these two major fe...
Write short notes on the following :CASE tool
CASE Tools CASE tools are set of software application programs, which are used to automate SDLC activities. CASE tools are used by softwar...
Label Cloud
#java
(2)
Assignments
(60)
BCA(Revised Syllabus)/ASSIGN/SEMESTER-I
(65)
BCA(Revised Syllabus)/ASSIGN/SEMESTER-II
(84)
BCS-011
(20)
BCS-012
(12)
BCS-062
(2)
BCS-063
(3)
bcs052
(1)
BCSL-013
(8)
BCSL-021
(1)
BCSL-022
(3)
BCSL-063
(1)
EMU8086
(1)
exams
(3)
java
(12)
Lab Manuals
(1)
Lab Schedule
(2)
MCS-011
(8)
MCS-012
(19)
MCS-013
(27)
MCS-015
(17)
MCS-022
(14)
MCS011
(6)
MCS012
(5)
MCS013
(8)
MCS014
(7)
MCS015
(7)
MCS016
(5)
mcs021
(1)
MCs023
(1)
MCs024
(1)
MCS031
(13)
MCS032
(8)
MCS033
(2)
MCS034
(7)
mcs035
(4)
MCSL-036
(1)
MCSL017
(4)
Session
(2)
Solved
(54)
SRS
(1)
TEE
(5)
UML
(1)
Viva
(1)
Powered by
Blogger
.
Print and Download
Looking for solved assignments?
Download now by filling this form.
Click to Download Now
0 ΰ€िΰ€ͺ्ΰ€ͺΰ€£िΰ€―ाँ:
Post a Comment