Represent the sentences by predicate calculus

Assignment Help Computer Engineering
Reference no: EM132144503

Question :

A swimmer is an athlete. Any athlete, who participatedin the 2016 Summer Olympics and won a gold medal, was joyful. Any athlete, who is the world top athlete or a selected well-trained athlete, participatedin the 2016 Summer Olympics.

Any time any participating athlete, who is performed the best in thefinal competition for a game, wins a gold medal for that game. Michael Phelps is one of the world top swimmer who wined many medals in past.

He performed the best in the three games of Men's 4X100m freestyle relay, Men's 200 m butterfly, and Men's 200m individual medley at the 2016 Summer Olympics in Rio de Janeiro from August 5 to 21, 2016.. Whether Michael Phelps was joyful when he won the gold medals?

Represent the sentences by predicate calculus

Turn them into clause form

Using resolution and unification to prove that Michael Phelps was joyful.

Reference no: EM132144503

Questions Cloud

Estimate the cost of equity for the company : Using the Capital Asset Pricing Model, estimate the cost of equity for the following company. Assume rate on unsecured corporate bonds
Determine the output technology : Describe a scenario in which the distribution of users determine the output technology.
What is the internal rate of return : a. What is the internal rate of return? (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places.)
Calculate the net present value the cost of capital : Calculate the net present value if the cost of capital is 12 percent.
Represent the sentences by predicate calculus : A swimmer is an athlete. Any athlete, who participatedin the 2016 Summer Olympics and won a gold medal, was joyful.
What is the expected return of a portfolio : What is the expected return of a portfolio with 25% invested in UK stock and 75% in the U.S. if the U.S. return was 15% and the UK was 12%?
What is the cost of equity under capm : a) What is the cost of equity under CAPM? b) What is the appropriate WACC for this opportunity?
Would you need completely new technology : Think about your own university or college and choose an idea that could improve student satisfaction with the course enrollment process.
What are the after-tax cash flows associated : a) What are the after-tax cash flows associated for each relevant period?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Which products must be restocked

The database includes fields for record number, store identification number, sales region, item number, item description, unit price, units sold, and weekly sales period when the sales were made.

  Write a script that prompts for a string

Write a script that prompts for a string and then checks whether it has at least 10 characters using (i) case, (ii) expr.

  What is difference between client and a server

What are the differences between client and a server. What is function of each layer in a three-layer application?

  How does frame relay compare to sending data over internet

What happens when a user transmits data faster than the agreed-upon committed information rate? How does frame relay compare to sending data over the Internet?

  Find the corner points that describe the optimum solution

For the Reddy Mikks model, find the corner points that describe the optimum solution for each of the subsequent objective functions:

  Simulate the transmission and reception of a text message

The purpose of this assignment is to simulate the transmission and reception of a text message over a noisy communications channel.

  Create logic for program that calculates due date for a bill

Create the logic for a program that calculates the due date for a bill. Prompt the user for the month, day, and year a bill is received.

  What are the three classical theories of privacy

What are the three classical theories of Privacy? Give an example of each privacy being lost.

  Script that will repetitively ask user for a binary number

write a script that will repetitively ask the user for a binary number and return its decimal equivalent until an illegal number (one containing digits other than 0 or 1) is entered.

  Performing comprehensive threat modeling

To enhance the security of information systems, enterprises are developing and adopting information system management systems.

  How is the height of a red-black tree related to its size

How is the height of a red-black tree related to its size? What is the relationship between red-black trees and B-trees?

  Which phase in the sdlc would be safest for your project

Unexpected situations happen all the time, and the more you plan for them, the better prepared you'll be when developing software.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd