Variables and quantifiers - first-order logic, Computer Engineering

Variables and Quantifiers:

Now we have to diagnose now that if we wanted to say that there is a meal at the Red Lion which costs only 3 pounds, is well sayed. Rather thenif we said that cost_of(meal, red_lion) = three_pounds, that is on this states that a particular meal (a constant, which we've labeled meal) costs 3 pounds. That does not accurately capture what we wanted to say. Just to a start, it implies in which side we know exactly which meal it is that costs 3 pounds, and however, the landlord at the Red Lion chose to let this the bizarre name of "meal". Furthermore it doesn't convey the fact that there may be more than one meal which costs 3 pounds.

In fact instead of using constants in our translation of the sentence could like we should have used variables as "there is a meal at the Red Lion costing 3 pounds". Nevereather than if we had replaced meal with something that reflects the fact that we are talking about a generic, rather than a specific meal, so things would have been clearer. Wherever a predicate relates something that be vary i.e. like our meal, than we call these things variables, so represent them with an upper-case word or letter.

Posted Date: 1/10/2013 5:23:59 AM | Location : United States







Related Discussions:- Variables and quantifiers - first-order logic, Assignment Help, Ask Question on Variables and quantifiers - first-order logic, Get Answer, Expert's Help, Variables and quantifiers - first-order logic Discussions

Write discussion on Variables and quantifiers - first-order logic
Your posts are moderated
Related Questions
Q. Explain about Barrier? Barrier: No actual transfer of data takes place in this mode unless all the processors involved in the communication execute a particular block, calle

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 Select a range of a

Explain the Power Dissipation characteristics for digital IC's. Ans. Power Dissipation: - It is amount of power dissipated in a digital IC. This is determined through

how can we find compound interest through flowchart

Explain the functioning of Firewall Using Screening Router. Firewall Using Screening Router: The risk of break-within is large along with this form of firewall: Eve

Enumerate in detail about Image Scanners Drawings, graphs, colour and black-and-white photos, or text can be stored for computer processing with an image scanner by passing an

What is micro operation? A micro operation is an elementary operation performed with the data kept in registers.   1) Register transfer microoperation transfer binary inform


Discuss about the Electronic computer The first general function programmable electronic computer was the Electronic Numerical Integrator and Computer (ENIAC), built by John V

1 1 1 1 2 1 1 3 3 1 1 4 6 4 1