1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
7

1) a) Create an unambiguous grammar which generates basic mathematical expressions (using numbers and the four operators , -, *,

/). Without parentheses, parsing and mathematically evaluating expressions created by this string should give the result you'd get while following the order of operations. For now, you may abstract "number" as a single terminal, n. In the order of operations, * and / should be given precendence over and -. Aside from that, evaluation should occur from left to right. So 8/4*2 would result in 4, not 1. 1 2*3 would be 7. 4 3*5-6/2*4 would be 4 15-6/2*4

Computers and Technology
1 answer:
Temka [501]3 years ago
8 0

Answer:

Explanation:

CHECK THE ANSWER IN THE ATTACHMENT CORNNER

You might be interested in
Provide an example by creating a short story or explanation of an instance where availability would be broken.
ryzh [129]

Incomplete/Incorrect question:

Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​

<u>Explanation:</u>

Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.

For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend

s without the consent of the celebrity.

6 0
3 years ago
Task 3&amp;4, please <br> with the formula
Anastasy [175]
It’s 12 because 3 times 4 is twelve, hope i helped!
6 0
3 years ago
If a computer has a multicore processor, what can the operating system do to improve performance? How does this technique work
OLga [1]

Answer:

If a computer has a multicore processor then the operating system can run multiple threads to better the performance. And the maximum number of threads is equal to the number of cores. For one core there can be one thread. And the technique that is required here is termed as the multithreaded programming. And if you have a multicore processor, and if you assume that all your target device has that level of the processor then you can make use of it in designing applications as well. However, you need to provide an alternative for the device that does not have this facility.

Explanation:

Please check the answer section.

8 0
3 years ago
The ______ view connects perceptual capabilities to information available in the world of the perceiver. Multiple choice questio
jekas [21]

Answer:

Ecological

Explanation:

Please mark brainliest

4 0
2 years ago
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises p
Vera_Pavlovna [14]

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

A spreadsheet application is a sort of computer programme that is often created with cells that are arranged in rows and columns in a tabular fashion in order to perform the following operations on a data set:

Generate

Sort

Calculate

Format

Arrange

What-if analysis, which is a feature of Microsoft Excel, is a procedure created and built for altering cell values in order to see how these changes will impact the results of Excel formulas on the spreadsheet.

Changing the values in cells to see how such changes may impact the results of formulas on the worksheet is known as what-if analysis. Scenarios, Goal Seek, and Data Tables are the three different What-If Analysis tools that are included with Excel. Data tables and scenarios use collections of input values to predict potential outcomes.

Learn more about Debra:

brainly.com/question/26142862

#SPJ4

3 0
2 years ago
Other questions:
  • Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
    15·1 answer
  • Software that manages the resources of the computer is called:
    12·1 answer
  • This one too its from computer engineering
    6·1 answer
  • In 3–5 sentences, describe how technology helps business professionals to be more efficient.
    7·2 answers
  • Write a program that gets a single character from the user. If the character is not a capital letter (between 'A' and 'Z'), then
    15·1 answer
  • Refer to the image below. The portion of the letter labeled 5. is the ___________________
    12·2 answers
  • In 1997, microsoft was accused of using a monopoly in operating systems to control the market for _____.
    8·2 answers
  • *
    6·2 answers
  • Tyler is feeling overwhelmed by the programming assignment from his supervisor and wants to break the task down into smaller, mo
    5·2 answers
  • Create a script to input 2 numbers from the user. The script will then ask the user to perform a numerical calculation of additi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!