Explain the alphabet and string, Operating System

Assignment Help:

Explain the Alphabet and String

A finite set of symbols is known as alphabet. An alphabet is frequently denoted by sigma, yet can be given any name.

B = {0, 1} says B is an alphabet of two symbols, 0 and 1.

C = {a, b, c} says C is an alphabet of three symbols, a, b and c.

Occasionally space and comma are in an alphabet whereas other times they are meta symbols employed for descriptions. A language is determined over an alphabet. For instance binary language is defined over alphabet B. 

A finite sequence of symbols from an alphabet is known as string or word.

01110 and 111 are strings from the alphabet B above.

aaabccc and b are strings from the alphabet C above.

A null string is a string along with no symbols, generally denoted by epsilon has zero length.

 

 


Related Discussions:- Explain the alphabet and string

Cache replacement policies, The physical memory acts as a cache backed by t...

The physical memory acts as a cache backed by the disk. When the physical memory is full, and we want to read in another page from disk, we have to evict a page from physical memor

List ways to share directories in operating system, List ways to share file...

List ways to share files among directories in operating systems. a. Copy file from one account into another. b. Link directory entry of "copied" file to directory entry of o

Command line interface, College life is tough.  Eating pizza for every meal...

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site that tells you how many calories eac

Explain the tlsalloc (void) - tls function call, Explain the TlsAlloc (VOID...

Explain the TlsAlloc (VOID) This function is used to allocate a TLS index.Any subsequent TLS function calls will require  the handle returned  from TlsAlloc to be passed. The i

Explanation of computer clustering and benefits, The CTO is still impressed...

The CTO is still impressed with your work. He just came back from a technology exposition where he heard about computer clusters. All he knows is that they are the big thing for bu

What are the deadlock prevention methodologies?, What are the deadlock p r...

What are the deadlock p revention methodologies? a.       Necessitate that processes request all resources before starting - if cannot be granted don't run. b.      Process

Name the evolutionary process models, Normal 0 false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Android, Which android version is available till now

Which android version is available till now

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd