Question

1. Henry has 28 plastic magnetic letters. He has 3 identical letters A, and exactly one...

1. Henry has 28 plastic magnetic letters. He has 3 identical letters A, and exactly one of each of the letters B through Z.

i. How many sequences of length 6 can Henry form if no letter repeats? For example, BITINA is now allowed because the letter I is used twice.

ii. How many sequences of length 6 can Henry form if the letter A is used exactly two times? For example, ADANSK uses the letter A twice.

iii. How many sequences of length 6 can Henry form if there are no restrictions? Any letters can be used or not used. Be careful in counting the copies of A that might be used.

Note: These are permutation problems that I have a basic understanding of. I just need a little clarification.

Thank you for your help, I'll be sure to rate!

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
1. Henry has 28 plastic magnetic letters. He has 3 identical letters A, and exactly one...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • please write clearly. thanks Part I. For questions 1-10, use only the sum, product and division...

    please write clearly. thanks Part I. For questions 1-10, use only the sum, product and division rules or a tree diagram to solve the problems. 1. Six different airlines fly from New York to Denver and seven fly from Denver to San Francisco. How many different pairs of airlines can you choose on which to book a grip from New York to San Francisco via Denver? 2. How many bit strings of length ten both begin and end with a...

  • **DO IT AS PYTHON PLEASE** The Trifid Cipher General Problem Description The Trifid cipher (not to be confused with the...

    **DO IT AS PYTHON PLEASE** The Trifid Cipher General Problem Description The Trifid cipher (not to be confused with the creatures from the classic science-fiction film "The Day of the Triffids") is an algorithm that enciphers a plaintext message by encoding each letter as a three-digit number and then breaking up and rearranging the digits from each letter's encoded form. For this assignment, you will create a set of Python functions that can encode messages using this cipher (these functions...

  • specifically on finite i pmu r the number of objøcts or ways. Leave your answers in fornsiala form, such as C(3, 2) nporkan?(2) Are repeats poasib Two points each imal digits will have at le...

    specifically on finite i pmu r the number of objøcts or ways. Leave your answers in fornsiala form, such as C(3, 2) nporkan?(2) Are repeats poasib Two points each imal digits will have at least one xpeated digin? I. This is the oounting problem Al ancmher so ask yourelr (1) ls onder ipo n How many strings of four bexadeci ) A Compuir Science indtructor has a stack of blue can this i For parts c, d. and e, suppose...

  • 1 Overview and Background Many of the assignments in this course will introduce you to topics in ...

    1 Overview and Background Many of the assignments in this course will introduce you to topics in computational biology. You do not need to know anything about biology to do these assignments other than what is contained in the description itself. The objective of each assignment is for you to acquire certain particular skills or knowledge, and the choice of topic is independent of that objective. Sometimes the topics will be related to computational problems in biology, chemistry, or physics,...

  • 60 points, Complete javadocs documentation required Be sure to submit all files (.java and dictio...

    60 points, Complete javadocs documentation required Be sure to submit all files (.java and dictionary.txt) required to run your program Background Boggle is a word game using a plastic grid of lettered dice, in which players attempt to find words in sequences of adjacent letters. The dice are randomly arranged in the grid, and players have 90 seconds to form as many words as possible from adjacent top-facing letters For example, the word SUPER is spelled in the gameboard to...

  • Procedure: Materials: 1. apparatus 2. 2 pieces of metal track 3. plastic or metal ball 4....

    Procedure: Materials: 1. apparatus 2. 2 pieces of metal track 3. plastic or metal ball 4. timer 5. meter stick 6. micrometer 7. 2 photogates Assemble your ramp as shown in Figure (1) in the next page. Then set up photogates in location 2 and 3. Measure the diameter (in m) of the metal balls (you will need it for speed calculations). Then, measure the weight (mass) of the ball (in kg). To have a better measurement of the time,...

  • Pre-Laboratory Exercise: Plastics Identification I. List four properties that you will use in lab...

    can someone help me find this information? Pre-Laboratory Exercise: Plastics Identification I. List four properties that you will use in lab to determine the identity of the polymer samples 2. Describe the density test. What observation will help you determine the density of each polymer? What precautions should be taken in placing the sample in the solutions? 3. Write the name and abbreviation for the six recyclable polymers 2 huetn deisity polyetayene.HDpz poulene: PP 4. Given the list of wavenumber...

  • 1) Briefly describe the evolution of management thinking highlighting the bureaucratic approach to management. 2) What...

    1) Briefly describe the evolution of management thinking highlighting the bureaucratic approach to management. 2) What kind of organization structure is reflected in this company? Discuss. 3) What attributes of the bureaucratic structure can you find in this company? 4) What management approach is practiced by the top management of the above company? Is this approach suitable for a company in the communication industry? Critically analyze. Reading Large, bureaucratic organizations have many rules and regulations. This, as well as other...

  • You will be writing a simple Java program that implements an ancient form of encryption known...

    You will be writing a simple Java program that implements an ancient form of encryption known as a substitution cipher or a Caesar cipher (after Julius Caesar, who reportedly used it to send messages to his armies) or a shift cipher. In a Caesar cipher, the letters in a message are replaced by the letters of a "shifted" alphabet. So for example if we had a shift of 3 we might have the following replacements: Original alphabet: A B C...

  • in JAVA -- need to use an arraystack for this and can only manipulate smartstring.java aka...

    in JAVA -- need to use an arraystack for this and can only manipulate smartstring.java aka the one that says :               public class SmartString implements SmartStringADT at the beginning //for SmartStringTest.java: import static org.junit.Assert.*; import org.junit.Test; public class SmartStringTest {    //Test insert method    @Test    public void testinsert1() {        SmartString evaluator = new SmartString();        evaluator.insert(0, "Hello");        evaluator.insert(4, ", how are you?");        assertEquals("Hello, how are you?", evaluator.toString());    }   ...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT