1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
2 years ago
7

Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem

ber) of a list Y. member(X,[X|R]). member(X,[Y|R]) :- ____________.A. member(X,R).
B. member(X,Y).
C. member(_,R).
D. member(Y,R).
E. member(X,Y).
Computers and Technology
1 answer:
Nadusha1986 [10]2 years ago
4 0

Answer:

The answer is "Option A"

Explanation:

In the given program code, two-member "X, Y" is used, in which X is an element of the list and Y is the list. In this another variable R declares, that store a number for the match, in this question choice "A" is correct because it uses an element and variable "R" for check and wrong choices can be described as follows:

  • In option B, in this two-parameter is used, in which one is an element and one is the list, that's why it is incorrect.
  • In option C, It is wrong because there is no underscore variable.
  • Option D and Option E both were wrong because in this list is passed as the parameter.
You might be interested in
CIST 1122 Project 2 Instructions
NikAS [45]

Answer:

it is suppost ro be at

least 20 tb

Explanation:

5 0
2 years ago
What types of storage can be used to access data from another computer
Aleksandr-060686 [28]
<span>Hard disk drives
</span><span>RAM<span>Random access memory (RAM)
</span></span><span>External hard disks
<span>USB port
</span></span>CD and DVD drives
<span>Memory cards</span>
6 0
2 years ago
Read 2 more answers
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
3 years ago
What occurs in a steam engine?
VARVARA [1.3K]
Fist one correct.
second wrong because not all heat is used for work, some of it lost to other.
third wrong because fuel burn inside is called combustion engine
 <span />
7 0
3 years ago
Read 2 more answers
What is this on G00gel Documents , how do I fix it?
mylen [45]

Answer:

Sorry but it donest show the picture

Explanation:

7 0
2 years ago
Other questions:
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
    11·2 answers
  • What electronic device can represent a KiloByte?
    14·1 answer
  • Can someone help please
    12·1 answer
  • Which of the following problems is least likely to be solved through grid computing? Financial risk modeling Gene analysis Linea
    14·1 answer
  • Write a program to output a big A like the one below
    12·1 answer
  • What are some things all boomers say.
    12·2 answers
  • What is microsoft excel​
    9·2 answers
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!