1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
2 years ago
14

Which is not one of the four criteria for proving the correctness of a logical pretest loop construct of the form: while B do S

end? a. The loop terminates. b. {I and B} S {I} c. left curly bracket I space a n d space (n o t space B )right curly bracket space rightwards double arrow space Q d. I space rightwards double arrow space P e. P space rightwards double arrow space I
Computers and Technology
1 answer:
Paul [167]2 years ago
3 0

Answer: d. I space rightwards double arrow space P

Explanation:

The loop invariant must always satisfy a number of requirements for it to be considered useful. Another consideration is the complicating factor for loop termination. Any loop which cannot terminate would always not be correct, which tends to compute nothing. Below is a complete axiomatic illustration showing the construct required for it to be true, where I is the loop invariant:

P => I

{I and B} S {I}

(I and (not B)) => Q

the loop terminates

You might be interested in
Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the
Neko [114]

Answer:

A. Run the parted command.

D. Reboot the system.

Explanation:

Linux command line shell is a vital tooling server administration. It provides the flexibility of executing user and kernel mode commands on the command line interface.

Unlike graphic user interface operating systems, it receives typed commands on its prompt to execute tasks. The fdisk command shows the newly created partition on a disk, and to reload, the parted command is executed or the system should be rebooted.

3 0
3 years ago
Which activity represents a violation of the licensing agreement
kvasek [131]
Could you give the answers it gives you? It should be along the lines of purposeful destruction of equipment.
5 0
3 years ago
Read 2 more answers
What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
HACTEHA [7]
It allows them to turn on and turn off your internet; also if you were wondering incognito or any private browsing still countermeasures all devises they can use to access your history
4 0
3 years ago
application that will perform a lot of overwrites and deletes of data and requires the latest information to be available anytim
o-na [289]

Answer:

RDS.

Explanation:

A corporation has implemented a software that conducts the number of information overwriting and deleting, which allows the newest details to be accessible whenever the information is examined. As a Software Engineer, they suggest RDS database technologies.

It is an AWS supported controlled SQL DB service that also reinforces the array type DB for the purpose to contain and maintain the information.

3 0
3 years ago
The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors tha
Artemon [7]

Answer:

Explanation:

The internet could be regarded has a marketplace or platform which gives individuals, businesses the opportunity to interact, relate, access opportunities, learn in an easy manner with the help of a data connection. The internet has redefined the process and concept of acesing information and interaction with the ease and coverage it brings. The Social media is could be seen a part of the internet platform which allows people to relate and interact, make friends, promote brands and so on. The internet and social media platforms however, in spite of its huge benefits comes with its inherent risk. Including the surge in cyber crime, immorality and information theft to mention a few. Common scenarios whereby banking details are being stolen from databases resulting in wholesale illegal transfer of funds. Issues of blackmail and violent defamation by groups of cohorts has also been a con in the advent of internet and social media, including growing trends of fake news which usually escalate tension, in which the recent unrest in my vicinity benefitted negatively from.

7 0
3 years ago
Other questions:
  • If you are upgrading your operating system to Windows 7, you may not use the In-Place Upgrade Installation Option with
    14·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    7·1 answer
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • Before his job interview, Shabnam took the time to carefully wash and iron his best khaki pants and a button-down shirt. He even
    15·2 answers
  • What is the cell reference for the cell located in the second column and fifth row of a worksheet?
    9·1 answer
  • Write a Python program that translates a binary number of n bits to a decimal number. Your program should first ask the user the
    8·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • What is polymerization1​
    11·1 answer
  • What will the following program display in the console?
    12·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!