1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
4 years ago
12

Prove whether each argument is valid or invalid. First find the form of the argument by defining predicates and expressing the h

ypotheses and the conclusion using the predicates. If the argument is valid, then use the rules of inference to prove that the form is valid. If the argument is invalid, give values for the predicates you defined for a small domain that demonstrate the argument is invalid. The domain for each problem is the set of students in a class. (e) Every student who missed class or got a detention did not get an A. Penelope is a student in the class. Penelope got an A.

Computers and Technology
2 answers:
RoseWind [281]4 years ago
5 0

Answer:

Consider following predicates:

M(x): x missed the class

D(x): x got a detention

S(x): x is a student in the class

Express the hypotheses and conclusion

Hypotheses:

∀x (S(x) ∧ M(x) --> D(x)) and S(Penelope) and D(Penelope)

Conclusion: M(Penelope)

Argument:

∀x (S(x) ∧ M(x) --> D(x)) ∧ S(Penelope) ∧ D(Penelope) --> M(Penelope)

The given argument is valid and prove using rules of inference as follows (Check attached image)

SSSSS [86.1K]4 years ago
3 0

Answer:

The given argument  ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

Explanation:

Solution:

Let us Consider following predicates:

M(x): x missed the class

D(x): x got a detention

S(x): x is a student in the class

A(x): x got an A

Now,

We Express the hypotheses and conclusion as:

The hypotheses: ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) and S(Penelope) and A(Penelope)

So,

The Conclusion:  D(Penelope)

Thus,

The Argument:

∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) ∧ S(Penelope) ∧ A(Penelope) -->D(Penelope)

Then,

The given argument is valid or correct and prove using the inference  rule as follows:

Step                      Premises                    Reason (Rule used)

1.  ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x))                Premise

2. S(Penelope) ∧ (M(Penelope)

  V D(Penelope)) --> ¬ A(Penelope)            Universal instantiation

3.  S(Penelope)                                              Premise

4.  A(Penelope)                                              Premise

5. ¬[S(Penelope) ∧ (M(Penelope)

  V D(Penelope))]                                         2,4, Modus Tollens

6. ¬S(Penelope) V (¬M(Penelope)

  ∧ ¬D(Penelope))                                        De Morgan law

7.¬M(Penelope) ∧ ¬D(Penelope)                 3,6,Disjunctive Syllogism

8¬D(Penelope)                                              7, Simplification

Therefore, the given argument ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

You might be interested in
Write the name of the tab, the command group, and the icon that you need to use to justify
Dafna11 [192]

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

<em>The icon has no name; rather it is represented by 4 horizontal lines that are aligned on both edges</em>

<em />

Explanation:

To answer this question, I'll make use of the following attachment

<em>Where</em>

<em>1- represents the home tab</em>

<em>2 - represents the paragraph</em>

<em>3 - represents the justify icon</em>

<em />

3 0
4 years ago
In this era of technology, everyone uses emails for mail and messages. Assume you have also used the
ipn [44]

Answer:

A class may be a structured diagram that describes the structure of the system.  

It consists of sophistication name, attributes, methods, and responsibilities.  

A mailbox and an email message have certain attributes like, compose, reply, draft, inbox, etc.

Software architecture affects:

Performance, Robustness, Distributability, Maintainability.  

Explanation:

See attachment for the Model object classes which may be utilized in the system implementation to represent a mailbox and an email message.

Advantages:

Large-scale reuse Software architecture is vital because it affects the performance, robustness, distributability, and maintainability of a system.

Individual components implement the functional system requirements, but the dominant influence on the non-functional system characteristics is that the system's architecture.

Three advantages of System architecture:

• Stakeholder communication: The architecture may be a high-level presentation of the system which will be used as attention for discussion by a variety of various stakeholders.

• System analysis: making the system architecture explicit at an early stage within the system development requires some analysis.

• Large-scale reuse:

An architectural model may be a compact, manageable description of how a system is organized and the way the components interoperate.

The system architecture is usually an equivalent for systems with similar requirements then can support large-scale software reuse..

7 0
3 years ago
Write a function getPigLatin(pigStr) that accepts pigStr as a parameter (a sentence as input) and converts each word to "Pig Lat
Vladimir79 [104]

Answer:

userInput = str(input("Enter your sentence here.\n")).upper()

def getPigLatin(userInput):

   splitInput = userInput.split(" ")

   newList = []

   for word in splitInput:

       firstLetter = word[0]

       if len(word) == 1:

           word += 'AY'

           newList.append(word)

       else:

           word = word.strip(word[0])

           word += firstLetter

           word += 'AY'

           newList.append(word)

   print(*newList, sep= " ")

getPigLatin(userInput)

Explanation:

This solution is done in Python

First the user is prompt to enter a statement, the statement converted to string and also capitalize using str and upper() built-in function. The user input is assigned to userInput variable.

The getPigLatin function is defined and it accept a string as parameter. Inside the getPigLatin function, the userInput is splitted and assigned to splitInput variable.

An empty list is also initialized and assigned to newList. Next, we loop through the splitInput. During the loop; we first check if the length of an element is one, then we just add 'AY' to the element and add the element to the newList. Else, if the element length is more than one; we strip the first letter from the word and also re-assign it to word, then the stripped first letter is added to the end of the word. Next, 'AY' is added to the word and the element is add to the newList.

The last line of the getPigLatin function display the entire element of the list using a space seperator.

The last line of the entire solution call the function passing in the userInput as argument.

8 0
4 years ago
LAB: Count characters - methods
tangare [24]

Answer:

i hope understand you

mark me brainlist

Explanation:

using namespace std;

#include <iostream>

 

#include <string.h>

#include <stdlib.h>

#include <stdio.h>

 

#define BLANK_CHAR (' ')

 

 

int CountCharacters(char userChar, char * userString)

{

 

int countReturn=0;

 

int n = strlen(userString);

 

for (int iLoop=0; iLoop<n; iLoop++)

{

       if (userString[iLoop]==userChar)

       {

        countReturn++;

 }

}

return(countReturn);

}

 

/******************************************

    Removes white spaces from passed string; returns pointer

     to the string that is stripped of the whitespace chars;

   

  Returns NULL pointer is empty string is passed;  

     Side Effects:

 CALLER MUST FREE THE OUTPUT BUFFER that is returned

 

 **********************************************************/

char * RemoveSpaces(char * userString)

{

 

 char * outbuff = NULL;

 

 if (userString!=NULL)

 {

   int n = strlen(userString);

    outbuff = (char *) malloc(n);

 

   if (outbuff != NULL)

   {

          memset(outbuff,0,n);

          int iIndex=0;

          //copies non-blank chars to outbuff

         for (int iLoop=0; iLoop<n; iLoop++)

         {

           if (userString[iLoop]!=BLANK_CHAR)

          {

           outbuff[iIndex]=userString[iLoop];

           iIndex++;

   }

   

   } //for

         

   }

   

   }

 return(outbuff);

 

}

 

 

int main()

{

 

 char inbuff[255];

 cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";

 gets(inbuff);

 

 char * outbuff = RemoveSpaces(inbuff);

 if (outbuff !=NULL)

 {

    cout << ">" << outbuff << "<" << endl;

    free(outbuff);

    }

     

   memset(inbuff,0,255);  

   cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";

gets(inbuff);

 

  char chChar;

 cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";

 cin >> chChar;

 

 int iCount = CountCharacters(chChar,inbuff);

 cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;

 

}

4 0
3 years ago
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
Other questions:
  • Discuss OPENGL instruction to draw the following drawing primatives:
    14·1 answer
  • Computer user support helps people with minor computer problems. <br><br> True or False
    12·1 answer
  • A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o
    11·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp
    12·1 answer
  • Global knowledge is the same as common knowledge.
    15·2 answers
  • John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the following
    9·1 answer
  • Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
    5·1 answer
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • Explain basic anatomy of computers.
    13·2 answers
  • Which of the following is NOT a media file? *<br> .wav<br> .mp4<br> .exe
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!