Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Prolog Programming Language :

Probably programming languages are procedural: than the programmer specifies exactly the right instructions (algorithms) required to get an agent to function correct. Well it comes as a surprise to many people in which there is another way to write programs. Declarative programming is whenever the user declares what the output to a function should look such given some information about the input. So after that the agent searches for an answer that fits the declaration, so that returns any it finds.

According to given an example, just visualize a parent asking their child to run to the shop and buy some groceries. Now for do this in a declarative fashion, there the parent simply has to write down a shopping list first. So the parents have "programmed" their child to perform their particular task in the knowledge in which the child has underlying search routines that will enable him or her to catch to the shop, and come home after find and buy the groceries.

Just to instruct their child in a procedural fashion, and they would have to tell the child to go out of the front door, and then turn left, and walk down the street, than stop after 70 steps, so on.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9517305

Have any Question?


Related Questions in Computer Engineering

Nbspa senior collected data concerning the amount of time

A senior collected data concerning the amount of time students had to wait when adding or dropping courses at the beginning of the semester. The student then built a model of the behavior and experimented different strat ...

Question the three as of security are authentication

Question: The three A's of security are Authentication, Authorization, and Auditing. Write a 1-2 page paper in APA format describing these techniques and how they are used in your organization. What could be improved? Th ...

Suppose alice shares a secret block cipher key kab with bob

Suppose Alice shares a secret block cipher key, K_AB with Bob, and a different secret block cipher key, K_AC with Charlie. Describe a method for Alice to encrypt an m-block message such that it can only be decrypted with ...

Reflective journal entryreflective journal entry on writing

Reflective Journal Entry Reflective Journal Entry on writing a Bibliography Assignment Topic; Research Question: One of the most common questions that new students learning programming students ask is what programming la ...

Question you need to research the topic and discuss the

Question: You need to research the topic and discuss the topic in at 400 words with references. Then, . reference will not count as a discussion. What would be the impact of predictive modeling on healthcare and medicine ...

Question after 1 year of launch ride sharing increased a

Question: After 1 year of launch, ride sharing increased a lot resulting in a lot of insertion requests to the database. Consider there is no room to further increase the size of server and changing database is not an op ...

Use the management studio to create a new database called

Use the Management Studio to create a new database called the default settings(If the database already exists, use the Management Studio to delete it and than create it.

Explain the two real world examples of database what are

Explain the two real world examples of database. What are they? How do people use them? Discuss at least one situation that would arise from problems in these database, such as redundant information, breach of informatio ...

Directionspick one topic for word and one topic

Directions Pick one topic for Word and one topic for PowerPoint to discuss. Word Watermark: What is the purpose of watermark for a document? What do you consider when you work on a watermark in Word? Newsletter: What are ...

Question you have been hired as a security specialist by a

Question: You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data. Write a 1- to 2-page recommendation paper outlining methods ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As