Which of the following is NOT a valid postfix expression?

a) a b c – d
b) a b – c d + –
c) a b c + /
d) a b c + d

D

Computer Science & Information Technology

You might also like to view...

A denial-of-service attack can be used to deny hackers access to a computer system

Indicate whether the statement is true or false

Computer Science & Information Technology

Information about a document such as the name of the document author, the file name, and key-words are called document ________

A) citations. B) notes. C) memos. D) properties.

Computer Science & Information Technology