1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
9

(a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen

t that minimizes the number of variables set to TRUE. Write the pseudo-code. HINT: eurtottesebtsumselbairavynamwohenimretedtsrif. HINT for hint: sdrawkcabtidaer. (b) How fast is your algorithm? Justify.
Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer:

Check the explanation

Explanation:

(a)

# We need to try all options(TRUE/FALSE) of all the Variables

# to find the correct arrangement.

permutations <- permutate(0,1,n) [Find all permutions O(2^n)]

for permutation in permutations:

for X in variables:

if(permutation[i] == 1)

substitute(H,X,true)

else

substitute(H,X,false)

if(satisfiable(H)) return permutation

increment i

You might be interested in
WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
pishuonlain [190]

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

8 0
3 years ago
Read 2 more answers
Your organization's IT department has developed a custom application that reports the hostname of each client that tries to acce
Andrews [41]

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

5 0
3 years ago
What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes
DerKrebs [107]

The result of sending the string above into a variable that has allocated space for 8 bytes is that there will be Buffer Overflow Attacks.

<h3>What occurs when a string of data  sent to buffer is large?</h3>

A buffer overflow is also known as buffer overrun. This  is known to be a process that occurs when or if  the size of data is known to be more than the storage capacity of any kind of memory buffer.

Note that due to the overload, the program that is trying to write the data to the buffer will therefore overwrites to the adjacent memory locations.

Learn more about string from

brainly.com/question/26427527

4 0
3 years ago
Make a ladtract class that has 2 fields, one for the tractor's length and one for the width. The class should have a method that
Virty [35]

Explanation:

Below is the java code for the ladtract class :-

public class ladtract

{

private double length;  //length of tractor

private double width;   //width of tractor

public double calculateArea(){  

    return length*width;    //calculate and return the area of the tractor

}

public boolean equals(Object o) {

    if (o == this) {    //check if it's the same object

        return true;

    }

       if(o.length==this.length && o.width==this.width){   //check if the length and width are same for both objects

           return true;

       }

       return false;  

}

public String toString(){

    return "Area="+calculateArea(); //return the area of the tractor as a string

}

}

7 0
3 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • In the circuit seen here, the resistor has a resistance of 3 ohms. If no change in the battery size occurs, what will happen to
    15·2 answers
  • 12.
    10·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
    12·2 answers
  • Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
    13·1 answer
  • Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
    11·1 answer
  • Justin bought some yarn from his favorite craft store. He can make 1 scarf with 3/5 of a ball of yarn. If he purchases 15 balls
    14·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Who made the game Monopoly???
    10·2 answers
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!