Which of the following is NOT a valid postfix expression?
a) a b c – d
b) a b – c d + –
c) a b c + /
d) a b c + d
D
Computer Science & Information Technology
You might also like to view...
A denial-of-service attack can be used to deny hackers access to a computer system
Indicate whether the statement is true or false
Computer Science & Information Technology
Information about a document such as the name of the document author, the file name, and key-words are called document ________
A) citations. B) notes. C) memos. D) properties.
Computer Science & Information Technology