Ans : Step 1: (α_1-> (α_2 ∨α_3)) (Premise) Step 2: α_1(Assumed Premise) Step 3: α_2 ∨α_3 (Modus Ponens, Step 1, 2) Step 4: α_2 -> ~α_1 (Premise) Step 5: ~α_2 (Modus Tollens, Step 2, step 4) Step 6: α_3 (Disjunctive Read More …
Blog
Ques : Describe Propositional rules of inference ?
Ans : 1 – Modus Ponens (MP)It states that if the propositions A → B and A are true, then B is also true.Modus Ponens is also referred to as the implication elimination because iteliminates the implication A → B Read More …
Ques : What is Logical connectives ?
Ans : Logical connectives are the operators used to join two or more atomicpropositions (operands). The joining should be done in a way that the logic andtruth value of the obtained compound proposition is dependent on the inputatomic propositions and Read More …
Ques : Describe Syntax of Propositional logic
Ans : The syntax of propositional logic allows two types of sentences to representknowledge. The two types are as follows: 1- Atomic Propositions These are simplest propositions containing a single proposition symbol and areeither true or false. Some of the Read More …
Ques : Principles of security management
Ans : There are six principles of security management:- Availability- The continuous accessibility of systems tends to procedures, policies and controls which are used to ensure prompt access to data for authorized customers. This purpose secures against deliberate or inadvertent Read More …
Ques : Security Measures and solutions
Ans : Access security- By restricting access of users who have been granted access to information, thereby results in monitoring who all have access to a particular data. Therefore, in cases of data theft, sifting through the timelines of Read More …
Ques : Describe security threats and attacks.
Ans : In today’s day and age there is a host of new and evolving cyber security threats that has theinformation security industry on high alert. There is an increasingly more sophisticatedcyber-attacks involving malware, phishing, cryptocurrency. Therefore, the data and Read More …
Ques : Describe Data security and Data Management
Ans : Database security is necessary in the following situations: Theft and fraud Loss of availability of data Loss of confidentiality Loss of data privacy Loss of data integrity The situations given above are the most likely to be exposed Read More …
Ques : Digital Security : PROS & CONS
Ans : Digital security is a broader term which encompasses within itself protection of onlineidentity data assets Technology with the use of various tools like software, Web Services,biometrics, firewalls, proxies, vulnerability scanner, instant message or telephone encryptiontools etc. Digital security Read More …
Ques : Describe cash collection and disbursements ?
Ans : Once the cash budget has been prepared and appropriate net cash flows established thefinance manager should ensure that there does not exist a significant deviationbetween projected and actual cash flows. The finance manager should expedite cashcollection and control Read More …