Answer:
Case
Explanation:
In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.
Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.
For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.
A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.
In a Select Case statement, each variable is referred to as a Case.
Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.
Answer:
Check the explanation
Explanation:
relatives.pl
/* Facts */
male(ace).
male(john).
male(jack).
male(bill).
male(david).
male(brown).
male(daniel).
female(cecil).
female(aba).
female(cathy).
parent(john,ace)
parent(tom,john)
parent(jack,john)
parent(bill,aba)
parent(brown,aba)
parent(cecil,bill)
parent(david,cecil)
parent(cathy,brown)
parent(daniel,cathy)
parent(ellen,daniel)
/* parent(X,Y) -> Y is parent of X */
wife(ceceil,jack) /* wife(X,Y) -> Y is wife of X */
Answer of 2-2
Considering all facts and rules answer will be daniel,ellen.
Answer 2-3
Considering all facts and rules answer will be bill.
Answer 2-4
Considering all facts and rules X will be john and y will be cecil.
Answer 2-5
Considering all facts and rules X will be tom and y will be david.
Answer:
Virus, cyber theft
Explanation:
A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.
Answer:
"It is media that is distributed in paper form, such as magazines and newspapers."