1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
14

Give examples of when each of the following are useful?

Computers and Technology
1 answer:
elena-s [515]3 years ago
3 0

Explanation:

a . Regular language -

Uses are as follows -

  • matching the regular expression patterns , like the Unix grep  .
  • patterns search and replace operations .
  • programming languages for the Lexical analysis in the compilation phase .

b. Context Free Language -

Uses are as follows -

  • match the count of one symbol with another symbol  .
  • Match a symbol with another symbol  .
  • submit one symbol with string made of other symbols recursively .

c. NP-Completeness  -

Uses are as follows -

  • used for Weighted Model Counting
  • Used for Integer Programming
  • used for Boolean Satisfiability testing

d. Decidability -

Uses are as follows -

  • Team games with incomplete information are undecidable.
  • Infinite chess (with limitations on rules and game pieces) is decidable.
  • Chess is decidable game

You might be interested in
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
3 years ago
A ___________ variable is declared outside all functions.
velikii [3]

Answer:

B. global

Explanation:

A global variable lives on even when a function returns.

7 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
Who is considered as the father of computer science​
Andru [333]

Answer:

Turing is considered as the father of computer science

4 0
3 years ago
Read 2 more answers
Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. a. natural-language
deff fn [24]

Answer:

d. expert system

Explanation:

Among the types of systems that support the decision-making process, the following are identical:

Decision Support Systems (DSS: Decision Support Systems)

Support decision making by generating and systematically evaluating different alternatives or decision scenarios.

A DSS does not solve problems, since it only supports the decision-making process. The responsibility of making a decision, of adopting and making it is the responsibility of the administrators, not of the DSS. It can be used to obtain information that reveals the key elements of the problems and the relationships between them. It can also be used to identify, create and communicate available courses of action and decision alternatives.

Support Systems for Group Decision Making (Group Decision Support Systems). They cover the objective of achieving the participation of a group of people during decision-making in anonymous and consensus environments, supporting simultaneous decisions.

Expert Support Systems for Decision Making (DEss: Expert Decision Supprt Systems). They allow to load knowledge bases that are integrated by a series of common sense rules so that different users consult them, support decision making, training.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • Give one advantage and two disadvantages of using a wireless network
    8·1 answer
  • An item such as a smart card is an example of the _______ form of authentication.
    10·1 answer
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • Which one of the following business names would be rated Incorrect for name accuracy? Answer McDonald's McDonald's H&amp;M McDon
    14·1 answer
  • What is an individual section machine?
    14·1 answer
  • How do you reduce computer screen flicker
    11·1 answer
  • What is machine learning
    9·2 answers
  • Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!