Answer:
Following are the answer to this question:
Explanation:
In option 1:
The value of n is= 7, which is (base case)

when n=k for the true condition:

when n=k+1 it tests the value:

since k>6 hence the value is KH>3 hence proved.
In option 2:
when:
for n=1:(base case)

0<=0 \\ condition is true
when the above statement holds value n=1
when n=k

when n=k+1


![[\therefore KH>K \Rightarrow \log(KH>\loK)]](https://tex.z-dn.net/?f=%5B%5Ctherefore%20KH%3EK%20%5CRightarrow%20%20%5Clog%28KH%3E%5CloK%29%5D)
In option 3:
when n=1:

when n=k
![\to (A_1\cap A_2 \cap.....A_k) \cup B\\=(A_1\cup B) \cap(A_2\cup B_2)....(A_k \capB).....(a)\\\to n= k+1\\ \to (A_1\cap A_2 \cap.....A_{kH}) \cup B= (A_1\cup B)\\\\\to [(A_1\cap A_2 \cap.....A_{k}) \cup B]\cap (A_{KH}\cup B)\\\\\to [(A_1\cup B) \cap (A_2 \cup B) \cap (A_3\cup B).....(A_k\cup B)\cap (A_{k+1} \cup B)\\\\ \ \ \ \ \ \ substituting \ equation \ a \\\\](https://tex.z-dn.net/?f=%5Cto%20%28A_1%5Ccap%20A_2%20%5Ccap.....A_k%29%20%5Ccup%20B%5C%5C%3D%28A_1%5Ccup%20B%29%20%5Ccap%28A_2%5Ccup%20B_2%29....%28A_k%20%5CcapB%29.....%28a%29%5C%5C%5Cto%20n%3D%20k%2B1%5C%5C%20%5Cto%20%28A_1%5Ccap%20A_2%20%5Ccap.....A_%7BkH%7D%29%20%5Ccup%20B%3D%20%28A_1%5Ccup%20B%29%5C%5C%5C%5C%5Cto%20%20%5B%28A_1%5Ccap%20A_2%20%5Ccap.....A_%7Bk%7D%29%20%5Ccup%20B%5D%5Ccap%20%28A_%7BKH%7D%5Ccup%20B%29%5C%5C%5C%5C%5Cto%20%20%5B%28A_1%5Ccup%20B%29%20%5Ccap%20%28A_2%20%5Ccup%20B%29%20%5Ccap%20%28A_3%5Ccup%20B%29.....%28A_k%5Ccup%20B%29%5Ccap%20%28A_%7Bk%2B1%7D%20%5Ccup%20B%29%5C%5C%5C%5C%20%20%5C%20%5C%20%5C%20%5C%20%5C%20%5C%20substituting%20%5C%20equation%20%5C%20a%20%5C%5C%5C%5C)
hence n=k+1 is true.
Discovery of any vulnerability in a software program can potentially be sold to the government: True.
<h3>What is vulnerability?</h3>
Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1
Answer:
John von Neumann is remarkable for his vast knowledge of mathematics, and the sciences as well as his ability to correlate the pure and applied sciences.
Explanation:
John von Neumann who was born on December 28 1903, and died on February 8,1957 was known for his extensive knowledge of mathematics, physics, computer, economics, and statistics. In computing, he was known to conceive the idea of the self-replicating machines that thrive in the automata cellular environment, the von Neumann architecture, stochastic computing and linear programming.
He developed the game theory in Economics, and laid the foundation for several mathematical theories. He contributed greatly to quantum mechanics and quantum physics. Little wonder, he was dubbed "the last representative of the great mathematicians."
Haley wickenheiser felt angry after the Bach said the IOC would make a decision in the next month as the IOC says the games will be held no later than summer 2021 but they will still be called the 2020 Tokyo Olympics.
Explanation:
- The Tokyo Olympics were postponed until 2021 on Tuesday, ending weeks of speculation that the games could not go ahead as scheduled because of the coronavirus pandemic.
-
The International Olympic Committee made the decision after speaking with Japanese Prime Minister Shinzo Abe and local organizers.
-
The IOC said the games will be held not later than summer 2021 but they will still be called the 2020 Tokyo Olympics.
-
“President Bach said he will agree ‘100%,’ and we agreed to hold the Tokyo Olympics and Paralympics in the summer of 2021 at the latest,” Abe said, saying holding the games next year would be “proof of a victory by human beings against the coronavirus infections.”
- The decision came only a few hours after local organizers said the torch relay would start as planned on Thursday.
B- find and replace can replace any word in the document with another.