1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
14

Which is not one of the four criteria for proving the correctness of a logical pretest loop construct of the form: while B do S

end? a. The loop terminates. b. {I and B} S {I} c. left curly bracket I space a n d space (n o t space B )right curly bracket space rightwards double arrow space Q d. I space rightwards double arrow space P e. P space rightwards double arrow space I
Computers and Technology
1 answer:
Paul [167]3 years ago
3 0

Answer: d. I space rightwards double arrow space P

Explanation:

The loop invariant must always satisfy a number of requirements for it to be considered useful. Another consideration is the complicating factor for loop termination. Any loop which cannot terminate would always not be correct, which tends to compute nothing. Below is a complete axiomatic illustration showing the construct required for it to be true, where I is the loop invariant:

P => I

{I and B} S {I}

(I and (not B)) => Q

the loop terminates

You might be interested in
What is ment by creative middle way solution
SOVA2 [1]
Looking for a way to resolve conflicting values that comes as close as possible to satisfying all relevant obligation
7 0
3 years ago
How does the Evaluate Formula dialog box help fix errors?
butalik [34]
C Bc I just did it and got it right
6 0
3 years ago
Read 2 more answers
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is c
Rina8888 [55]

Answer:

The answer is "bullwhip".

Explanation:

It is an effect, that exists as a consumer, which has highly unstable to demand and, also, increases perceptions around. It also enables you to defines the System design to have a ripple effect.

  • The purpose of that kind of document is to offer an imaginative analysis of the fiction, complemented by simulations to make the situation more readable.
  • It is a large stock variation, that is triggered specifically by alterations throughout the production of the customers.
8 0
3 years ago
You do not really know that you have a hand. Here is why. Imagine the possibility in which you are only a handless brain floatin
Harrizon [31]

Answer:

If you do not know you are a brain in a vat, you do not have hands.

Explanation:

This premise is plausible as to understand the handless brain which is floating in a vat. The brain is connected to a super computer and it transmits messages to the brain. The brain receives those message and give signals to perform tasks.

8 0
3 years ago
Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the nam
MatroZZZ [7]

Answer:

#include <iostream>

#include<string.h>

using namespace std;

void printCharacter(string name){

   for(int i=0;name[i]!='\0';i++){

       cout<<name[i]<<endl;

   }

}

int main()

{

   string name;

   cout<<"enter the name: ";

   cin>>name;

   printCharacter(name);

}

Explanation:

first include the two libraries iostream for input/output and string library for using the string.

then, create the main function and declare the variable type string.

cout instruction is used o display the message on the screen.

cin is used to store the value in the name variable.

after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.

4 0
4 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • 5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
    13·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • After conducting interviews with several bad candidates, Althea, a manager at Langrover Inc. interviewed a candidate who was bet
    15·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • What are the characteristics of the sorting and grouping options in Outlook? Check all that apply. Columns can be sorted by clic
    15·2 answers
  • When would the Jerusalem virus attack?<br> 1. Friday the 13th<br> 2. Wednesday the 13th
    13·2 answers
  • Which factor affects reading speed the most?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!