Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these queries with only facts, you should answer then using facts and rules

Answers

Answer 1

Using the computational knowledge in python it is possible to write a code that uses the functions to make a  a prolog program to answer the following queries

Writting the code in python:

valid([]).

valid([Head|Tail]) :-

fd_all_different(Head),

valid(Tail).

sudoku(Puzzle, Solution) :-

Solution = Puzzle,

Puzzle = [S11, S12, S13, S14,

S21, S22, S23, S24,

S31, S32, S33, S34,

S41, S42, S43, S44],

fd_domain(Solution, 1, 4),

Row1 = [S11, S12, S13, S14],

Row2 = [S21, S22, S23, S24],

Row3 = [S31, S32, S33, S34],

Row4 = [S41, S42, S43, S44],

Col1 = [S11, S21, S31, S41],

Col2 = [S12, S22, S32, S42],

Col3 = [S13, S23, S33, S43],

Col4 = [S14, S24, S34, S44],

Square1 = [S11, S12, S21, S22],

Square2 = [S13, S14, S23, S24],

Square3 = [S31, S32, S41, S42],

Square4 = [S33, S34, S43, S44],

valid([Row1, Row2, Row3, Row4,

Col1, Col2, Col3, Col4,

Square1, Square2, Square3, Square4]).

| ?- sudoku([_, 4, 3, 2,

3, _, _, _,

4, 1, _, _,

_, _, 4, 1],

Solution).

Solution = [1,4,3,2,3,2,1,4,4,1,2,3,2,3,4,1]

yes

See more about python at brainly.com/question/18502436

#SPJ1

Using Above Information, Write A Prolog Program To Answer The Following Queries. Please Note That You

Related Questions

What are the three advantages of using blockchain technology? multiple choice all of the answer choices are correct. digital trust internet of things integration immutability

Answers

The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

What is blockchain technology?

A Blockchain is known to be a kind of a chain of blocks that is made up of information.

Note that the data that are said to be stored inside a block is one that is based on the type of blockchain. Blockchain  is seen as a kind of a shared, form of immutable ledger that quickens the process of putting down or recording transactions and helps in the tracking of assets in a business network.

Hence, The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

Learn more about blockchain technology from

https://brainly.com/question/25700270

#SPJ1

the manager of a xyz organisation is preparing the organizational chart which feature of MS Excel /he will use to do so? also write the steps for this​

Answers

Answer:

Smart Art

Explanation:

The smart art feature in Microsoft excel allows for the creation of organizational chart on Microsoft excel. It readily allows for an hierarchical arrangement of an organization's personnel including the various departments on the system. The smartart allows the implementation of a graphical output which allows the display of an organization's personnel in order of hierarchy. To get started with smart art on excel, Clicking on the insert tab, the same are appears under illustrations. For an organizational chart, the Hierarchy smart art graphic type is selected and filled accordingly.

Which of the following allows you to copy
formatting of text from one part of your presentation
and apply it to text in another part of your
presentation?
Animation Painter
Animation
Format Painter
slide master
DONE

Answers

Answer:

format painter

Explanation:

Multiple Select
Which of the following statements about localization are true? Select 2 options.
The goal of localization is to create an application or site that looks and feels like it was created for a specific market.
Really the only issue in localization is translating the text into another language.
You should avoid slang and idioms, since they will not be understandable to many audiences.
It is a good idea to use lots of images, since they are easily understood by all cultures.
For consistency, it is a good idea to use dollars as a currency in all versions of an application

Answers

Answer:

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

B. Really the only issue in localization is translating the text into another language.

Explanation:

In Computer science, localization can be defined as the process of designing, developing and adaptation of computer software applications or websites for different languages and geographical regions with peculiar differences.

This ultimately implies that, the main purpose for localization of a product such as a website or software application is to ensure they are specialized and specifically suited for a linguistic or geographical region.

The following statements about localization are true;

I. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

II. Really the only issue in localization is translating the text into another language.

Answer:

C. You should avoid slang and idioms since they will not be understandable to many audiences.

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

are the answers

Explanation:

Figure shows a multiplexer in a synchronous TD slot is only 10 bits long (3 bits taken from each input plus is the output stream? The bits arrive at the multiplexer arrows.

Answers

The solution to the bits arrive at the multiplexer arrows is shown in the image attached.

What is a multiplexer used for in computing?

A multiplexer is known to be a kind of a device that is same to be one that is able to take a lot of analog signals and also helps to forwards the input that were taken into a single line.

Note that they are seen as devices that are often used to to boast the amount of data that are known to be passed over a network.

A good example of  a given non-electronic circuit of a multiplexer is known to be the single pole multi-position switch.

Therefore, The solution to the bits arrive at the multiplexer arrows is shown in the image attached. because it accurately tells the the arrangement of the 10 bits  in the arrow.

Learn more about multiplexer from

https://brainly.com/question/15052768

#SPJ1

What does this mean

Answers

Answer:

"Y YUR Y YUB I CUR YY 4 ME"

Explanation:

thats what i read lol, i dont know the meaning though

What is the 3 common keys used to access the BIOS.​

Answers

Answer:

To access your BIOS, you'll need to press a key during the boot-up process. This key is often displayed during the boot process with a message “Press F2 to access BIOS”, “Press <DEL> to enter setup”, or something similar. Common keys you may need to press include Delete, F1, F2, and Escape.

PLEASE HELP ME! Sam was researching rocks and minerals. He thought the Web site looked unprofessional, so he looked for the author's information or credentials. He couldn't find any. Is this site reliable? A. Probably B. Probably not.

Answers

Answer:

B

Explanation:

If a site looks unprofessional and doesn't have any credentials, those are two signs that it's probably not very reliable.

Gui screen usually contain elements that are called?

Answers

Answer: Widgets

Components

Controls

Explanation:

press _________ to toggle the selected range as bold​

Answers

Answer:

press the b that i in a dark shade that is bold

Write a loop that will take in 5 numbers from the user and output the average. Round your answer to two decimal places.
Sample Run:

Enter a number: 2
Enter a number: 7
Enter a number: 11
Enter a number: 4
Enter a number: 5
The average is 5.8

Hurry please!! will mark brainliest!!

Answers

I’m gonna do it in the form of a pseudocode.

Pseudocode 1: Number_Average
Declare sum, num, num_count, average
START
sum = 0
num_count = 0
average = 0
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
Display “Enter a number”
Read num
While(count = 5)
DO
num_count = 0+1
sum = 0+1
average = sum/5
ENDWHILE
STOP

Evaluate each condition as to whether it is true or not.
You can join the Army if you are over 17 and healthy. Have you met those requirements if you are 16 and healthy?
You can earn a scholarship if you have an ACT over 30 or you are valedictorian of your high school. Have you eamed a scholarship if you have an ACT
of 34 but are not the valedictorian?

Answers

Answer:

For the first one you have not met those requirements because you are still 16, for the second one you have met those requirements because you can either have a score over 30 (which you have 34) or be a valedictorian

Explanation:

Above

Accenture began its own Cloud journey in 2015, after our internal IT organization recognized the significant advantages to be gained in leveraging Cloud capabilities at scale. Today, which percentage of Accenture's infrastructure and processes are in the Cloud?

Answers

Answer: 95%

Explanation:

Accenture began its own Cloud journey in 2015, and invested in about $3 billion to move to cloud. This has helped the company in timely delivery and achieving organizational goals.

Today, the percentage of Accenture's infrastructure and processes that are in the Cloud is about 95%. Its HR, sales, finance, legal system etc are all in cloud.

The percentage of Accenture's infrastructure and processes that are stored or located in the Cloud is: 95%.

A Cloud can be defined as the elastic leasing of pooled computer resources (physical hardware) over the Internet and through the use of virtualization.

Accenture is one of the world's largest management and technological consulting company that provide services such as:

Database managementConsultingStrategy planningOutsourcing

Basically, Accenture help business organizations in the implementation of data governance and management policies, in order to ensure the organization's data is trustworthy and reliable.

In 2015, Accenture started its own Cloud journey after recognizing the significant advantages it stand to gain or benefit in leveraging Cloud capabilities at a larger scale.

Consequently, the percentage of Accenture's infrastructure and processes that are stored or located in the Cloud is 95 percent.

Read more: https://brainly.com/question/23844088

The developers have used the results from the model to choose a computer controlled flood defense system. It will have a barrier which can open or close. describe the role of the microprocessor in such a system​
key word sensor , ADC , microprocessor, Preset , higher and lower barrier

Answers

The role of the microprocessor in a computer controlled flood defense system are:

The flood signal makes the microprocessor to start a flood control work or function that tends to interrupts the constant operating cycle that is known to be executed.

Note that  if any, and it start and keeps the operation of a drain cycle until the water is known to have returns to the constant level for a a given period of time.

What is the role of the microprocessor?

The Functions of Microprocessor are:

It helps to control or monitors all the parts of the machine and it often sends timing signals.It helps to move data between memory and I/O devices.It helps to bring back data and instructions from a given memory.

The microprocessor is known to be one that acts as the central unit of a computer system that carries out duties such as the arithmetic and logic operations.

Hence, The role of the microprocessor in a computer controlled flood defense system are:

The flood signal makes the microprocessor to start a flood control work or function that tends to interrupts the constant operating cycle that is known to be executed.

Note that  if any, and it start and keeps the operation of a drain cycle until the water is known to have returns to the constant level for a a given period of time.

Learn more  about microprocessor from

https://brainly.com/question/614196

#SPJ1

Assembler Language
CSCI 360-1 Assignment 4 Name_____________________
Spring 2019 ABENDs and Dump Reading
25 points
This programming assignment does not require any further coding or documentation than what is provided. The program will ABEND and your task is to learn how to investigate what happened so that you can debug your own Assembler programs in the future. To begin, run the following program on the Marist mainframe using the ASSIST JCL used previously. Be sure you type it or copy it EXACTLY as shown below:
DUMP1 CSECT
USING DUMP1,15 ESTABLISH REG 15 AS BASE REG
*
SR 2,2 CLEAR REG 2
*
LA 3,NUM1 LOAD ADDRESS OF NUM1 INTO REG 3
LA 4,NUM2 LOAD ADDRESS OF NUM2 INTO REG 4
*
A 2,0(,3) ADD NUM1 TO REG 2
A 2,0(,4) ADD NUM2 TO REG 2
*
LA 5,SUM LOAD ADDRESS OF SUM INTO REG 5
ST 2,0(,5) STORE THE SUM OF NUM1 & NUM2 AT SUM
*
XDUMP , SET REG 2 TO 35
*
LTORG
*
SUM DC F'0' FULLWORD OF ZERO TO LATER HOLD SUM
*
NUM1 DC F'1206000000' VARIOUS FULLWORD INTEGER VALUES
NUM2 DC F'972460'
NUM3 DC F'1344335922'
*
END DUMP1
Use the resulting ABEND dump output to answer the questions below. Each is worth 2 points except question 11 which is worth 5 points.
Did this error occur (a) while the program was being assembled or (b) when it was being run?
________________________________________________________________________________
What is the address of the next instruction which would have been executed?________________________________________________________________________________
What is the value of the condition code at the time of the ABEND?
________________________________________________________________________________
What is the length of the instruction that caused the ABEND (number of bytes)?
_______________________________________________________________________________
What is the address of the instruction that caused the abend?
_________________________________________________________________________________
What type of error occurred (number and name)?
_________________________________________________________________________________
What usually causes this error?
_________________________________________________________________________________
What does the value in register 2 represent at the time of the ABEND dump?
__________________________________________________________________________________
What instruction needs to be added to fix this ABEND?
_________________________________________________________________________________
What does the value stored at location counter value 00002C represent?
_________________________________________________________________________________
What exactly happened here to cause the ABEND? Be detailed but succinct in your description.
_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

Answers

hello thnks

Explanation:

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

I think it's B, Delegate

Explanation:

Cause the other options didn't seem to fit as the answer.

I really don't know though.

A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).

What is a mailbox?

A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.

A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.

When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.

Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.

Thus, the correct answer would be option (C).

Learn more about the mailbox here:

https://brainly.com/question/28430685

#SPJ6

How can identity theft be prevented?

Answers

Answer:

Identity theft can be prevented by using proper security measures

Explanation:

Identity theft can be prevented by using proper security measures such as stronger passwords and VPN. It can also be protected by making sure your system security is up to date.

Create a file name that to ensure the that the file is easy to find

Answers

Answer:

I always name mine something like HI

or YEET i dont know

why but it works

Explanation:

The File name would be : ABC!

Computer professionals known as software engineers, or Blank______, use the software development life cycle to create software required for information systems.

Answers

Answer:

Computer professionals known as software engineers, or programmers use the software development life cycle to create software required for information systems.

Explanation:

Computer professionals are called software engineers and programmers because they develop and program software. Some additional titles for computer professionals are hardware engineers and iOS/Android developers.

PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regarding medications, treatments, and diets are accurate. the first websites he finds has a lot of information about a diet plan to help diabetic live healthy lifestyle. Omar can't figure out who the author of the site is and he notices that matches the one described on the website. Which of these are red flags that he should continue doing more research elsewhere? choose the right answer

a. the content is biased towards a particular diet plan that the site is advertising

b. Omar cant find the author so there is no proof that the writer can be trusted to provide medical advice.

c. both A and B

d. none of the above. the website can be trusted.


Nikolas is doing research on U.S visas for a school project. he has found conflicting information on two sites. the first site is travel.state.gov and the other is traveldocs.com which site should Nikolas trust more? choose the answer

a. Travel.state.gov

b. Traveldocs.com

Answers

Not sure on the first question, but the second would be answer choice a: Travel.state.gov since a website with .gov at the end tend to be trustworthy sources

Answer: 1. C. both A and B.

2.  Travel.state.gov

Explanation: i took the test!

If you connect to a network through your phone or cable company, then you probably connect through a________.

Answers

If you connect to a network through your phone or cable company, then you probably connect through an Ethernet crossover cable.

What is meant by the ethernet cable?

This is the type of cable that is known to be used for the wired types of connections. These types of cables are unlike the other types of connections such as the broadband which may be an internet type of connection that people use.

The ethernet cables are cables to connect using those devices that are in the the  local area networks. The popular example is the router. Hence we can say that If you connect to a network through your phone or cable company, then you probably connect through an Ethernet crossover cable.

Read more on ethernet here: https://brainly.com/question/1637942

#SPJ1

A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​

Answers

Answer:

a person who creates a computer virus is a programmer

Answer: hacker

Explanation:

Create a program that will calculate and print to the screen a sales receipt

Answers

Answer:

The Code:

print('Invoice Bill')

table = Table(['Item Name', 'Item Price'])

total = 0

while(1):

   name = input('Enter Item name:')

# "x" to exit and print the table

   if(name != 'x'):

       price = int(input('Enter the Price:'))

       # store all the prices in "total"

       total += price

       table.add_row([name, price])

       continue

   elif(name == 'x'):

       break    

table.add_row(['TOTAL', total])

print(table)

print('Your total bill amount is ', total, '/-')

Explanation:

This program is written in the PYTHON language.

The user needs to enter the item name and price as much as they want; this will print the item name, item price and total in tabular form.

#SPJ2

Write a written report about the possible input devices of the future?

Answers

Answer:

Its inevitable, people will make errors while using your input device. It is crucial that you measure how many of each of these types of errors are made, so you are able to use techniques to effectively counter them: 1. Mistakes —User uses the wrong method to achieve the tasks 2. Slips — The method used carried out incorrectly.

Explanation:

a person who creates a computer virus is called

Answers

Answer:

A person who creates computer virus is known as hacker.

Que ventajas podria traer el internet a la educacion artistica? Ayuda porfa telo pido porfavor

Answers

Answer:

"Informacion"

Explanation:

La internet puede traer las mismas ventajas para la educacion artistica que cualquier otra materia y eso es "Informacion". El arte tiene muchas tecnicas. Tambien hay muchos differentes estilos de arte. La internet tiene toda la informacion sobre los artistas mas famosos de las historia, incluyendo su arte, tecnicas, estilos, temas, historias, etc. Esta informacion es sumamente importante y util por que te enseña a utilizar todos los metodos ya creados y usarlos como herramientas para crear arte que representa el artista que sos.

A writing guide in making a project correctly.

a.project proposal
b.project plan
c.project format
d.project template ​

Answers

Answer:

b

Explanation:

B Project plan hope this helps

Question #6
Multiple Choice
What tag is used to contain information about a web page, such as the title and related pages?

O
O

Answers

Answer:   b; head

Explanation:

Answer: <head>

Explanation: EDGE '23

When using spanning tree protocol. What is the first step in selecting paths through a network?

Answers

The first step in selecting paths through a network is STP must first select the root bridge, or master bridge.

Which one is the first step in STP operation?

The STP network convergence consists in three steps: elect a root bridge, elect root ports and elect designated and non-designated ports. When you enable STP, the first step in its convergence process is to elect a switch to act as a root bridge using the Spanning Tree Algorithm.

See more about STP at brainly.com/question/20039073

#SPJ1

Write a definition in your own words for Raster Graphic. Do not copy and paste please.

Answers

Answer:

Raster Graphic is a bitmap. They are basically a grid of small pixels that make an image.

Other Questions
if a flower growing in a clear plastic flower pot is watered, and the next day the standing water is observed in the pot, what term would describe the top level of that water? each of don super's career stages can be experienced only once in a lifetimetrue/false Mrs Henry in undergoing a bedside bronchoscopy. What are your patient care priorities during this procedure? Consider a fuel cell that uses the combustion of ethanol to produce electricity,CH3CH2OH (l) + 3O2 (g) ---> 2CO2 (g) + 3H2O (l)Use thermodynamic data to determine the value of Ecell for this cell at 25 C. please Provide an example instance of the fractional knapsack problem where a greedy strategy baesd on repeatedly choosing as much of the highest-benefit item as possible results in a suboptimal solution the nurse is assigned to a client in the icu. during the initial assessment, the nurse notes jugular vein distention and recognizes that the plan of care will follow which disorder? find the expected value e(x), the variance var(x) and the standard deviation (x) for the density function. (round your answers to four decimal places.) f(x) = 3x on 0, 2/3 there is an actual line between networks and the internet that separates what we can see from what we cannot. true false If the Fed were to continuously use expansionary monetary policy in an attempt to hold unemployment below the natural rate, the long-run result would bea. an increase in the level of output.b. a decrease in the unemployment rate.c. an increase in the rate of inflation.d. all of the above. mikhail gorbachev's policy of new freedoms was known as: A. dtente. B. glasnost.C. mutually assured destruction.D. the brezhnev doctrine. Someone pls help me.. A 50 foot rope is stretched tight from the roof of a building to a spot 20 feet from the base of thebuilding. How tall is the building? Round your answer to TWO decimal places. 4Question 7 of 10Before you start reading, you should:start a 3-2-1 organizer.B. figure out your purpose for reading.C. set a long-term goal for yourself.D. set up three columns for organizing information.OA. special districts in texas are primarily paid for by revenue generated by 1.1.4 Express 25/75 as a percentage. Identify if the sentence is parallel or not parallel. 1. She decided to leave her job and travelling the word. 2. He started the engine,released the hand break,and checked the mirror. 3. She wants neither the red one nor yellow one. 4. When i wake up I like either walking the dog or to go for a jog. 5. Spain is a place where you can eat cheap food and soak up the sun. Please help me with this question as quick as you can :) Which statement about hemiacetals is false? a. a hemiacetal is a geminal hydroxy ether. b. they are formed by the nucleophilic attack of an alcohol on an aldehyde. c. they can be converted to a ketal. d. the formation reaction is a two step process, catalyzed by acids. e. the formation reaction is reversible. many british cities have an aras of open space surroudning them called What is the body's first line of defense against infection by foreign organisms?-The skinThe skin is the first line of defense against foreign organisms. It acts as a non-specific barrier to water and air-borne infectious agents.