Give string that contains more dashes than dots

Assignment Help Computer Engineering
Reference no: EM1328998

Consider a language of words, where each word is a string of dots and dashes. The following grammar describes this language:

< word> = < dot> | < dash> < word> | < word> < dot>
< dot> = .
< dash> = -

a) Write all three-character strings that are in this language.
b) Is the string .... in this language? Explain.
c) Write a seven-character string that contains more dashes than dots and is in the language. Show how you know that your answer is correct.
d) Write pseudocode for a recursive function isIn(str) that returns true if the string str is in this language and returns false otherwise.

Reference no: EM1328998

Questions Cloud

Effective business strategies to achieve it strategies : Discuss what you think are the most important leadership characteristics on that list and in forming effective business strategies appropriate to achieve those IT strategies.
A well known business person walks : A well known business person walks into your business and asks to speak to the owner. He introduces himself as John Doe and would like to talk to you in private. Mr. Doe is retiring and is closing his business that was located just down the street,
Rate and the mechanics'' performance : Electronic Unit Pricing in Supply Chain Management; Honda Allowed Mechanic's Rate - What is your opinion of Honda's allowed rate and the mechanics' performance?
Find out an output which maximizes the total revenue : Find out an output which maximizes the total revenue. Calculate the price elasticity of demand at this output.
Give string that contains more dashes than dots : Write down a seven-character string that contains more dashes than dots and is in the language. Show how you know that your reply is correct.
Service operations queues : How are people waiting in queues in service operations similar to buffering inventories in manufacturing and in what ways are they different
Organizational culture increase organizational effectiveness : In what ways can organizational culture increase organizational effectiveness?
List the factors that control governmental risk : List the factors that ontrol governmental risk
How to adapt for large-scale transnational it projects : What aspects of your project communications planning would you adapt for large-scale transnational IT projects in that the project teams and other stakeholders are geographically dispersed (say in India, Canada, China and Brazil) and having differ..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Security vulnerability

What is the security vulnerability of this solution

  What to recommend as a method of change

Contemporary organizations should be supportive of widening the span of control, flattening structure, and forming collaborative and flexible teams.

  Explain the gui and command line utilities

throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

  Consider the business impact of any situation

Consider the business impact of any situation

  What is the advantage when target is throughput and security

What is the advantage when target is throughput and securityty

  In-house development of software

Discuss the innovative and creative ways in order to use patient ID bracelet consisting of a bar-code representation of patient's ID.

  Designing an erd

xplain why all this normalization stuff is so significant?" he asks. "The old system worked “OK” most of time, and now you're telling me we require all these special rules. Why is this essential?" Develop the ERD in MS Visio.

  Osi layered structure and different protocols

List and discuss major de-merits of the layered approach to protocols in scholarly detail.Explain why data network communication and distributed applications.

  How to compare and contrast the two systems

In San Jose, CA, Riordan Manufacturing Company is in the procedure of upgrading all computers. Windows 2K is the network operating system. IT has decided to upgrade the network operating system, and your team is tasked with evaluating both Windows..

  Mapping the cache organization

A computer has a memory of 16 blocks, 32 bytes each, and a cache of 8 blocks, which blocks may be read from the block No. 5 in the cache, if the system utilizes: Fully associative the mapping cache organization.

  Routing process

Access control is handled at the ____ layer at the time of routing process; the router consults the list of rules before forwarding the incoming packet.

  Determining the compliment of a number

Express 64 as the 2’s compliment number. Specify the number of bits you require? With this number of bits, state the largest positive number you may represent?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd