Discrete Mathematics and Its Applications, Seventh Edition

Published by McGraw-Hill Education
ISBN 10: 0073383090
ISBN 13: 978-0-07338-309-5

Chapter 1 - Section 1.4 - Predicates and Quantifiers - Exercises - Page 55: 42

Answer

$ a) ∀xA(x). $ $b) S(file system, locked)⇒∀xA(x,system mailbox). $ $c)S(firewall, diagnostic)⇒S(proxy server, diagnostic). $ $d) (T(100)∧¬T(500)∧¬M(proxy server, diagnostic))⇒∃x S(x, normal).$

Work Step by Step

There are many ways to write these, depending on what we use for predicates.$ $a) Let "A(x)"be "User has access to an electronic mailbox." Then we have ∀xA(x). $ $b) Let A(x, y) be "Group member z can access resource y," and let S(x,y) be "System is in state y." Then we have S(file system, locked)⇒∀xA(x,system mailbox). $ $c) Let S(x,y) be "System is in state y. Recalling that only if indicates a necessary condition, we have S(firewall, diagnostic)⇒S(proxy server, diagnostic). $ $d) Let T(x) be "The throughput is at least x kbps," where the domain of discourse is positive numbers, Int M(x,y) be "Resource x is in mode y," and let. S(x,y) be "Router x is in state y." Then we have (T(100)∧¬T(500)∧¬M(proxy server, diagnostic))⇒∃x S(x, normal).
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.