1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
2 years ago
7

Define the proposition in symbols using: p: The weather is bad. q: The trip is cancelled. r: The trip is delayed. Proposition in

words: If the trip is delayed, then the trip will not be cancelled.
Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
6 0

Answer:

"(r->(~q))" is the correct answer for the above question.

Explanation:

  • The proposition symbol is used to represent the sentence in symbols form. This symbols can also be called as logic symbols. There are so many specified symbols which is used to write the symbolic form for the sentence.
  • For example, 'Not' is represent '~' and "if and then" is represented by the help of "->".
  • The above symbolic statement is made with the help of 'r' and 'q'. which is mean as.
  • if r then negation of q.
  • Which can be (r->~q) which is the answer.
You might be interested in
Which of the main value components are contained in the value proposition "SportsAde offers serious athletes a great-tasting way
Elina [12.6K]

Answer:

Explanation:unique difference/benefits

- "a great-tasting way to stay hydrated during exercise" this is the benefit statement

2. product/service category or concept is

- the drink

3. target market

- "serious athletes" is the target market

4. offering name or brand is

- SportsAde

5 0
3 years ago
Statement: There are two files. One file, "badIP_list.txt" has a listing of known bad IP addresses. These addresses were extract
lapo4ka [179]

Answer:

See explaination

Explanation:

SOURCE CODE IN PYTHON:

inp=open('badIP_list.txt', 'r') #opening file for input

badIPs=[i.rstrip('\n') for i in inp.readlines()] #reading bad IPs

inp.close() #closing file

inp=open('server_logs.txt', 'r') #opening file for input

IPs=[i.rstrip('\n') for i in inp.readlines()] #reading all IPs from log

inp.close() #closing file

uniqueBadIPs=[] #to store unique bad IPs

countBadIPs=0 #to store count of bad IPs

countIPs=0 #to store count of all IPs

for IP in IPs: #iterating through the log of IPs

if IP in badIPs: #checking if IP is bad

countBadIPs+=1

if IP not in uniqueBadIPs: #checking if bad IP is unique

uniqueBadIPs.append(IP)

countIPs+=1

out=open('filter_list.txt', 'w') #opening file for output

out.write('_________________________________________________________\n')

out.write('Date : 26/07/2018\nName : Last, First\nMajor: CS\n\n')

out.write('Server logs contained these known bad IP addresses:\n')

for IP in uniqueBadIPs: #output the unique bad IPs

out.write(IP+'\n')

out.write('\n')

out.write('Total unique known bad IP\'s detected:\n'+str(len(uniqueBadIPs))+'\n\n')

out.write('Percentage of bad IP addresses in server logs:\n{:.2f}%\n'.format(countBadIPs*100/countIPs))

out.write('_________________________________________________________')

out.close() #closing file

5 0
3 years ago
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the s
lukranit [14]

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

<h3>What are compliance tools?</h3>

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

brainly.com/question/24338783

#SPJ1

4 0
2 years ago
If the moon disappeared, what effect would this have on the Earth’s tides?
avanturin [10]
<span>There would no longer be any tides.< this seems like the most probable answer because there will be no gravitational pull from the moon that causes tides 
</span>
8 0
3 years ago
Other questions:
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • Which of these sedimentary rocks is made of the largest particles?
    10·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • (HELP ASAP) Jenae is helping her dad create a blog for his garden club. Which tool will she use?
    7·2 answers
  • Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Everyti
    11·1 answer
  • How do you put a picture when you ask a question?
    6·2 answers
  • NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
    5·1 answer
  • The __________ gear is the input gear.<br> A. Drive<br> B. Driven
    5·2 answers
  • A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
    8·1 answer
  • Felicity wants to capture the attention of the regular subway commuters in her area though her print advertisements​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!