Thư viện tài liệu trực tuyến miễn phí dành cho các bạn học sinh, sinh viên
Program state can be modeled as a list of pairs. E.g., [[x,1], [y,5]] Function to retrieve the value of a variable from the state: get(Var, [[Var, Val] | _], Val). get(Var, [_ | Rest], Val) :- get(Var, Rest, Val). E.g., ?- get(y, [[x, 5], [y, 3], [z, 1]], V). V = 3
22 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1046 | Lượt tải: 0
Prolog programs are made from terms, which can be: Variables Constants Structures Variables begin with a capital letter, like Bob. Constants are either integers, like 24, or atoms, like the, zebra, ‘Bob’, and ‘.’. Structures are predicates with arguments, like: n(zebra), speaks(Y, English), and np(X, Y) The arity of a structure is its numb...
20 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 856 | Lượt tải: 0
A file can be treated as an input or output stream. In reality file streams are buffered for efficiency: it is not practical to read or write one character at a time from or to mass storage. It is common to treat text files as streams.
21 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 961 | Lượt tải: 0
Testing software for reliability rather than fault detection. Measuring the number of errors allows the reliability of the software to be predicted. Note that, for statistical reasons, more errors than are allowed for in the reliability specification must be induced. An acceptable level of reliability should be specified and the software tested ...
47 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 938 | Lượt tải: 0
They emerged in the 1960’s with Lisp Functional programming mirrors mathematical functions: domain = input, range = output Variables are mathematical symbols: not associated with memory locations. Pure functional programming is state-free: no assignment Referential transparency: a function’s result depends only upon the values of its parameters...
18 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1067 | Lượt tải: 0
Risk management is concerned with assessing the possible losses that might ensue from attacks on the system and balancing these losses against the costs of security procedures that may reduce these losses. Risk management should be driven by an organisational security policy. Risk management involves Preliminary risk assessment Life cycle risk ...
48 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1253 | Lượt tải: 0
Conversion is the technical process by which a new system replaces an old system Three major steps to a conversion plan Acquire and install needed hardware Install software Convert data Three dimensions to a conversion plan Conversion style Conversion location Conversion modules
28 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1067 | Lượt tải: 0
Benchmarks uses the java.util.Random class — a more controlled way to generate random numbers. Constructors: If we set the same seed, we get the same “random” sequence.
42 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 977 | Lượt tải: 0
Imperative programming paradigm Algorithms + Data Structures = Programs [Wirth] Produce a program by functional decomposition Start with function to be computed Systematically decompose function into more primitive functions Stop when all functions map to program statements
52 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1225 | Lượt tải: 0
Assess whether a set of classes that must work together do so without error Four common approaches User interface testing Use case testing Interaction testing System interface testing Most projects use all four approaches
22 trang | Chia sẻ: huyhoang44 | Ngày: 17/03/2020 | Lượt xem: 1444 | Lượt tải: 0
Copyright © 2025 Tai-Lieu.com - Hướng dẫn học sinh giải bài tập trong SGK, Thư viện sáng kiến kinh nghiệm hay, Thư viện đề thi