1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
2 years ago
7

1) a) Create an unambiguous grammar which generates basic mathematical expressions (using numbers and the four operators , -, *,

/). Without parentheses, parsing and mathematically evaluating expressions created by this string should give the result you'd get while following the order of operations. For now, you may abstract "number" as a single terminal, n. In the order of operations, * and / should be given precendence over and -. Aside from that, evaluation should occur from left to right. So 8/4*2 would result in 4, not 1. 1 2*3 would be 7. 4 3*5-6/2*4 would be 4 15-6/2*4

Computers and Technology
1 answer:
Temka [501]2 years ago
8 0

Answer:

Explanation:

CHECK THE ANSWER IN THE ATTACHMENT CORNNER

You might be interested in
Open punctuation means that no punctuation follows the salutation or complimentary close. *
zloy xaker [14]

Answer:

True

Explanation:

When open punctuation is used, we do not expect the use of punctuation after salutation or complimentary close. It is a relatively new concept in business writing and we can rightly use this method in modified block letter style of writing.  

Some companies have developed business letter templates that are arranged in an open style, which permits the use of open punctuation in all aspect of business writings.  

7 0
3 years ago
the graph at left in the tctct, c-plane models the global wind power capacity, ccc, in gigawatts, ttt years since 199619961996.
Elena-2011 [213]

The intercept of a graph is the point where the graph crosses the axes of the graph.

The interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

On the graph (see attachment), we have the following observations

  1. The vertical axis represents the global wind power capacity (i.e. the c-axis)
  2. The horizontal axis represents the years since 1996 (i.e. the t-axis)

So, the c-intercept is the point that crosses the vertical axis.

From the graph, the curve crosses the c-axis at c = 7, and t = 0 (i.e. years = 1996)

Hence, the interpretation of the c-intercept is: <em>in 1996, the global wind power capacity was approximately 7 gigawatts.</em>

<em />

<em />

Read more about intercepts at:

brainly.com/question/3334417

4 0
1 year ago
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge
Bumek [7]
Hmmm when they say that we have a debt of $10,000 but you don't but you don't know that so they ask you for the personal data for your bank so their can get in and get the money for you so you don't have to and that how they trick you
4 0
2 years ago
When do you use a for loop instead of a while loop?
creativ13 [48]

Answer:

i dont know.prob guess a short loop.

Explanation:

8 0
2 years ago
How do you print "Hello World" in the console with Python? Wrong Answers Only.
Nata [24]

Explanation:

with keyboard........

4 0
2 years ago
Read 2 more answers
Other questions:
  • If you have 5 bits, how high can you go in binary?
    15·1 answer
  • Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
    12·1 answer
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
    10·1 answer
  • When somthing is trustworthy we call it what?
    12·2 answers
  • When would it be necessary to edit the information shown on an electronic business card?
    5·2 answers
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • Write a function magicCheck that takes a one-dimensional array of size 16, a two-dimensional array of four rows and four columns
    10·1 answer
  • Write a java code to print Multiplication Table Till 20
    14·2 answers
  • The act of using computer equipment to “break into” the computer systems of others?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!