The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a computer program is only a necessary and not a sufficient condition for reasonable [program] correctness. Rewrite this statement without using the words necessary or sufficient.

Answers

Answer 1

Answer:

A computer program is not reasonably correct if it has no error messages during translation.

 

Explanation:

First, we need to understand what the statement means, and we also need to identify the keywords.

The statement means that, when a program does not show up error during translation; this does not mean that the program is correct

Having said that:

We can replace some keywords as follows:

absence of error messages := no error messages


Related Questions

A rectangle indicates a single process.true or false​

Answers

Answer: False

Explanation: I just learned about this like 4 months ago lol

Answer:

false

Explanation:

Hope this helps

A musician has recorded some initial ideas for new songs which she wishes to share with her bandmates. As these are initial ideas she is not too concerned about the quality of the audio files she will send, but does wish the size of the files to be as small as possible so they can be easily downloaded by her bandmates, including using mobile data. Which of the following should she do to meet these requirements? Select two answers.
Save the audio using a high sampling rate.
Save the audio using a low sampling rate.
Save the audio using a low bit depth.
Save the audio using a low amplitude (volume).

Answers

Answer:

1.save the audio using a low sampling rate

2.save the audio using a low bit depth

Explanation:

1. if the quality of the audio is low then the size of the audio will also be low and which will make the size of the data to be less and also easier to download

What is your favorite LEGO set

Answers

Answer:

star wars death star....

i like any of them they are all so cool lol

solve x + 4 / x - 3 = 4 , step by step explanation will mark as brainliest ​

Answers

Answer:

I didn't get the exact answer..but hope this help

What you need to know In this program, a roll string is a number, followed by a lowercase "d", followed by another number. The first number is the number of dice to roll. The second number is the number of sides on each die. For example, 1d6 means there is one die with six sides. The total output of the roll is a random whole number between one and six, inclusive. 2d8 means there are two dice, each with eight sides. The total output of the roll is a random whole number between two and 16, inclusive. Since we are using a computer, we can have an input like 500d1000 (meaning a 1000-sided die, rolled 500 times) which would not be possible in real life.
Function: get_roll(rollstring)
This function takes an input parameter as a string that looks like "1d3", "3d5", etc. The function should return an integer simulating those dice rolls. In the case of "3d5", for example, the function will generate a random number between one and five, three times, and return the total (sum) as an integer. This function should return the value back to get_damage().
Function: get_damage(attack, defense)
This function gets the value of damage based on roll strings. Player 1 (the first roll) is always on attack; Player 2 (the second roll) is always on defense. If the defense roll is greater than the attack roll, return 0. Otherwise, return attack minus defense, as an integer. This function should call get_roll() twice, once for each Player. This function should return the value back to main_main().
Function: main_menu()
In this function, ask the user how many rounds they want to play. Next, ask the user to input Player 1 and Player 2’s dice for roll one, roll two, etc., up to the number of rolls they entered. The rolls for each round must be entered on one line with no spaces. This function should call get_damage() for each round.

Answers

Answer:

import random

def get_damage(attack,defense):

   attack_roll = get_roll(attack)

   defense_roll = get_roll(defense)

   if defense_roll>attack_roll:

       return 0

   else:

       return attack_roll-defense_roll

def main_menu():

   rounds = int(input('Enter the number of rounds to play? '))

   for round in range(1,rounds+1):

       p1=  input('Player 1 enter rollstring: ')

       p2=  input('Player 1 enter rollstring: ')

       damage = get_damage(p1,p2)

       print('Round: #{}, Damage: {}'.format(round,damage))

def get_roll(rollstring):

   dices, sides = rollstring.split('d')

   total = 0

   for roll in range(int(dices)):

       total += random.randint(1, int(sides))  

   return total

main_menu()

Explanation:

The main_menu python function is the module dice game that prompts for user input to get the number of times a round is played to call the get_damage function which in turn calls the get_roll function to simulate the dice roll and return the accumulated total of the sum of the random dice value.

Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2) test, (3) assignment, (4) exam, and (5) practice scores. The program should use variables, cout, cin, getline(), type casting, and output manipulators. The user should enter the name of the student and scores ranging from 0 to 100 (integer) for each grading item. The final score is the sum of all grading items. The average score is the average of all grading items. Here is a sample output of the program: Enter the Student's name: John Smith Enter Class Participation Score ranging from 0 to 100: 89 Enter Test Score ranging from 0 to 100: 87 Enter Assignment Score ranging from 0 to 100: 67 Enter Exam Score ranging from 0 to 100: 99 Enter Practice Score ranging from 0 to 100: 80 John Smith: Final Score: 422 Average Score: 84.4 Submit: a flowchart . source file Hw3.cpp The screenshot of output

Answers

Answer:

Following are the code to the given question:

#include<iostream>//defining header file

using namespace std;

int main()//defining main method

{

float clspat,test,asst,exam,practice,total,average;//defining floating variable

char name[100];//defining char variable to input value

cout<<"Enter Name of Student: ";//print message

cin>>name; //input value

cout<<"Enter scores in following scoring items between 0 and 100:"<<"\n";//print message

cout<<"Enter class participation score: ";//print message

cin>>clspat;//input value

cout<<"Enter test score: ";//print message

cin>>test;//input value

cout<<"Enter assignment score: ";//print message

cin>>asst;//input value

cout<<"Enter exam score: ";//print message

cin>>exam;//input value

cout<<"Enter practice score: ";//print message

cin>>practice;//input value

total=clspat+test+asst+exam+practice;//calculating total value

average=total/5;//calculating average value

cout<<endl<<"SCORE CARD OF "<<name<<"\n"<<"-----------------------"<<"\n";//print value with message

cout<<"Total score: "<<total<<"\n";//print message with value

cout<<"Average score: "<<average; //print message with value

}

Output:

please find the attached file.

Explanation:

In this code, the floating-point variable is declared, which is used for input value from the user-end and after input the floating-point value it uses the "total, average" variable to calculate its respective values and store its value with init, after storing the value into the variable it uses the print method to print its values.

List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice

Answers

Thor Odin and Aries the threes listed powerful

An administrator wants to restrict access to a particular database based upon a stringent set of requirements. The organization is using a discretionary access control model. The database cannot be written to during a specified period when transactions are being reconciled. What type of restriction might the administrator impose on access to the database

Answers

Answer:

Time of the day and object restrictions

Explanation:

From the question, we understand that the database is not allowed to be accessed at a certain period of time.  

Because this has to do with time (period), the administrator will need to set a time of the day object restriction on the database in order to prevent the users from accessing the database objects

6
Where is the Text Highlight Color button located?
a. In the Font group on the Home tab
b. In the Text group on the Edit tab
C. In the Paragraph group on the Home tab
d. In the Font group on the Edit tab

Answers

Answer C in the paragraph group on the home tab

EXTRA CREDIT - 1 point! Scenario: A small business has implemented the best way to handle the few Service Accounts they have in their AD: They use a random password generator to set Service Account passwords, have 1 Service Account per service, and policies are set so that the accounts do not expire. The current passwords are not even stored anywhere. The company rigorously documents this setup, and diligently deprovisions accounts when services configurations change. The company has also implemented Account Monitoring, and know when any of the Service Accounts is being attempted to be used without the correct password, indicating an attack attempt. Due to the security sensitivity of the data accessible via the Service Accounts, any attack attempts will cause the service account to be disabled and IT staff alerted. Finally, the company has implemented a script that can be used to update the existing passwords -- resetting them via the only account delegated this authority: the Enterprise Root account. To ensure none of the IT staff can use the Enterprise Root account to reset a Service Account without consent, the password for the Enterprise Root account is only known to the company's CIO (Chief Information Officer), and is not stored anywhere. Identify (1) one major problem that you can see with this setup, and describe why this is a problem. There are multiple correct answers possible for this EXTRA CREDIT question.

Answers

Answer:

A small business has implemented the best CIO:-

Though the setup is well planned but there is another drawback to that setup as the root password is with the company CIO. So, even in case of critical situation, if the CIO is somehow unavailable, the entire business will be inactive as users can't able to logon into the system as it is mentioned the service accounts can only be reset using the ROOT account. There should be other alternatives to this failure.

Explanation:

Consider the following code snippet:
public class Vehicle
{
. . .
public void setVehicleClass(double numberAxles)
{
. . .
}
}
public class Auto extends Vehicle
{
. . .
public void setVehicleClass(int numberAxles)
{
. . .
}
}
Which of the following statements is correct?


a. The Auto class overrides the setVehicleClass method.
b. The Vehicle class overrides the setVehicleClass method.
c. The Auto class overloads the setVehicleClass method.
d. The Vehicle class overloads the setVehicleClass method.

Answers

Answer:

c. The Auto class overloads the setVehicleClass method.

Explanation:

In this snippet of code the Auto class overloads the setVehicleClass method. This is because if a super-class and a sub-class have the same method, the sub-class either overrides or overloads the super-class method. In this case the sub-class Auto is overloading the setVehicleClass method because the parameters are different. The Auto class methods parameter are of type int while the super-class methods parameter are of type double. Therefore, it will overload the method if an int is passed as an argument.

Which one of the following media is unguided media ?
A : fiber optic
B : Coaxial cable
C : Twisted pair
D : Satellite transmission

Answers

Answer:

Satellite transmission

What was one of the main advantages of BPR at Chevron?​

Answers

Answer:

Business process re-engineering improves performance of chevron at end-to-end process and saves company's fifty million dollars by reducing operation cost.

9. Which of the following is the
leading use of computer?​

Answers

Complete Question:

What is the leading use of computers?

Group of answer choices.

a. web surfing.

b. email, texting, and social networking.

c. e-shopping.

d. word processing.

e. management of finances.

Answer:

b. email, texting, and social networking.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.

Hence, the leading use of computer is email, texting, and social networking.

Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?

Answers

Answer:

The website is

classroom

Explanation:

NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT
What can you do with the free version of the splice editor

Answers

Answer:

can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite

Explanation:

with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money

Answer:

It has a 7 day free trial while your using the free version

Explanation:

Company A’s IT department has a hosting platform specifically for systems used by the company’s large marketing department. This platform provides critical, high-availability hosted IT resources and services. However, the IT department has started to receive complaints about the time it takes to start new marketing campaigns, primarily due to how long it takes to provision new servers within this platform. Also, as a result of a recent set of mergers and acquisitions, the consumers of the services hosted by this platform have become more distributed, with service consumers accessing services from a large variety of locations, and with increasingly different types of devices. In response to these complaints, Company A is considering using a cloud-based hosting platform. Which specific characteristics of a cloud will be helpful for Company A to address its problems?

Answers

Answer:

cloud has the On demand and ubiquitous access characteristics

Explanation:

The specific characteristics of cloud that would be helpful for his problem to be addressed is the fact that cloud offers on demand usage and ubiquitous access.

What is meant by on demand access is that the cloud customer can pay for cloud services and use them whenever they are needed. As long as the cloud service is authorized.  

By Ubiquitous access it means that the cloud customer has reliable access without the presence of any form of disturbances or issues and it can be accessed from anywhere. Different range of devices are supported on the cloud platform and with the presence of internet lots of services can be accessed.

Based on the issues being faced by customers, this characteristics of cloud will be useful to address the problems.

Which statement about the Weather Bar in the Outlook calendar is true?

A.It displays weather for the current location for five days.
B.It does not require an internet connection to update.
C.Additional cities can be added for travel needs.
D.It sends pop-up alerts about severe weather.

Answers

Answer:

C

Explanation:

Tyrone Shoelaces has invested a huge amount of money into the stock market and doesnât trust just anyone to give him buying and selling information. Before he will buy a certain stock, he must get input from three sources. His first source is Pain Webster, a famous stock broker. His second source is Meg A. Cash, a self-made millionaire in the stock market, and his third source is Madame LaZora, world-famous psychic. After several months of receiving advice from all three, he has come to the following conclusions:

a) Buy if Pain and Meg both say yes and the psychic says no.

b) Buy if the psychic says yes.

c) Donât buy otherwise.

Construct a truth table and find the minimized Boolean function to implement the logic telling Tyrone when to buy.

Answers

Solution :

The truth table is :

Pain      Meg       Psych     Buy

   [tex]$0$[/tex]           [tex]$0$[/tex]                [tex]$0$[/tex]            [tex]$0$[/tex]

   [tex]$0$[/tex]           [tex]$0$[/tex]                [tex]$1$[/tex]            [tex]$1$[/tex]

   [tex]$0$[/tex]           [tex]$1$[/tex]                [tex]$0$[/tex]           [tex]$0$[/tex]

   [tex]$0$[/tex]           [tex]$1$[/tex]                 [tex]$1$[/tex]             [tex]$1$[/tex]

   [tex]$1$[/tex]            [tex]$0$[/tex]               [tex]$0$[/tex]            [tex]$0$[/tex]

   [tex]$1$[/tex]            [tex]$0$[/tex]               [tex]$1$[/tex]             [tex]$1$[/tex]

   [tex]$1$[/tex]            [tex]$1$[/tex]                [tex]$0$[/tex]            [tex]$1$[/tex]

   [tex]$1$[/tex]           [tex]$1$[/tex]                  [tex]$1$[/tex]              [tex]$1$[/tex]

The Boolean function :

[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex] = [tex]$\overline {\text{PainMeg}}\text{Psych}+\overline{\text{Pain}}\text{MegPsych}+\text{Pain}\overline{\text{Meg}}\text{Psych}+\text{PainMeg}\overline{\text{Psych}}$[/tex][tex]$+\text{PainMegPsych}$[/tex]

                              Meg and Psych

                           [tex]$00$[/tex]     01     [tex]$11$[/tex]       10

  Pain         0                 1        1

                   [tex]$1$[/tex]                 [tex]$1$[/tex]        1        [tex]$1$[/tex]

Therefore,

[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex]  = Psych + PainMeg

WHY
is communication Important
in
space​

Answers

Answer:

Communication is vitally important to astronauts while they are in space. Not only does it allow them to talk to their friends and family back home, it also allows them to communicate with the team of experts on the ground that helps them carry out their mission safely.


The process of saving information to a secondary storage device is called...

Answers

Answer:

The process of saving information to a secondary storage device is referred to as embedding.

Explanation:

The process of saving information to a secondary storage device is called embedding.

What is embedding?

One technique a writer or speaker could use to lengthen a sentence is embedding. When two clauses fall into the same category, they can frequently be nested inside of one another. For illustration: The baked product was presented by Norman. My sister didn't know about it.

Her thumb had the thorn embedded in the surface there, locked onto something. A person or thing is said to be embedded when it is a highly important or powerful part of that person, item, etc. Guilt was deeply engrained in my conscience.

The embedding strategy modifies each video frame slightly in an attempt to try covert or undetectable data concealing.

Thus, it is embedding.

For more information about embedding, click here:

https://brainly.com/question/16911950

#SPJ6

Design the program in the following way:

a. Prompt the user for the name of a boat and then for that boat's time (in seconds).
b. Continue to do this until the user presses enter without entering a name or enters a sentinel value.
c. At this point output the name of the race winner along with the time, the average time, the name the slowest boat along with its time.
d. Use a map structure to store the boat names and their associated times. You may use lists within the program as you see fit.

Answers

Answer:

d = {}

while True:

   name = input("Enter the name of the boat (Press Enter or q to stop): ")

   if name == "" or name == "q":

       break

   time = int(input("Enter the time (in seconds): "))

   d[name] = time

winner_name = min(d, key=d.get)

winner_time = min(d.values())

average_time = sum(d.values()) / len(d.values())

slowest_boat = max(d, key=d.get)

slowest_time = max(d.values())

print(f"Winner name: {winner_name} and its time: {winner_time}")

print(f"Average time: {average_time}")

print(f"Slowest boat: {slowest_boat} and its time: {slowest_time}")

Explanation:

*The code is in Python.

Create an empty map(dictionary) to hold the values

Create a while loop. Inside the loop:

Ask the user to enter the name of the boat. Check if the user presses Enter or q, using if and break

Ask the user to enter the time

Insert these values as key-value pair to the map

When the loop is done:

Find the winner_name, the min() function finds the minimum value in a list. In this case, the key=d.get creates a list of the values in the map. The min(d, key=d.get) returns the key of the minimum value

Find the winner_time, min(d.values()) returns the minimum time in our map

Find the average time, the sum() function, returns the sum of the values in a list. In this case, sums all the values in the map. The len() function finds the count of the values. If we divide the sum of times entered by the count of the times entered, we get the average time

Find the slowest_time, the max() function returns the max of the value in a list. In this case, the maximum value is the slowest time

Print the results

ANSWER ASAP! 50 POINTS!!!!
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which
role should you configure?
O Assignee
O Client
O Delegate
O Manager

Answers

Answer:

The first one/Assignee

Explanation:

Definition:

1.

a person to whom a right or liability is legally transferred.

2.

a person appointed to act for another.

The assignee peace’s it’s the role that works better when you configure about it

When machining rotors, what is the reason for setting the indexing collars to zero?

A. To know how much metal was taken off of each side.

B. To make sure that no cut exceeds .010 inch

C. To determine the proper cut speed of the Brake Lathe.

D. To measure the depth of the grooves on the rotor surface.

Answers

Answer:

To determine the proper cut speed of the brake lathe

To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

What is indexing collars?

Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.

"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.

By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.

Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

To learn more about indexing collars, refer to the link:

https://brainly.com/question/12608731

#SPJ2

Many types of academic writing require multiple sources ?

True

False

Answers

Answer:

True!

Explanation:

A few types that need them are;

News articles

Narratives

Opinion writes

Etc

Answer: False

Step by Step Explanation:
You could use as many sources as you want :)

Question 4 (7 points)
What is NOT a type of pricing?
0 0 0
Bait pricing
Distribution pricing
Value-in-use pricing
Prestige pricing

Answers

I think they’re all types of pricing ;-;

Question 2 (6 points)
The business philosophy describes the business's education, training, strengths, weaknesses, and personal development.
True
False
Question 3

Answers

Answer:

False

Explanation:

Answer:

false

Explanation:

differentiate between a university and a TVET college in terms of what each offers and explain the stigma associated with TVET colleges​

Answers

Answer: See explanation

Explanation:

The main focus of a Technical Vocational Education and Training (TVET) college is to prepare the students and train them so that they'll be functional in a skilled trade. It focuses on vocational training and education. University isn't really concerned about transfer of skills but rather more concerned with the transfer of knowledge to the students

The Technical Vocational Education and Training (TVET) qualification is also faster, cheaper and easier to get than the university certificate which is costlier and takes longer period to get.

The stigma associated with TVET colleges has been created by both the society and the government. Firstly, people believed that only those from poor backgrounds or those that couldn't gain university admisson go to TVET colleges.

Also, the government isn't helping matters as public funding for education are allocated more to universities and not really allocated to TVET colleges. These has brought about the stigma to the TVET.

The difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

University and TVET college

The major difference is University provide students with knowledge the need based on the course they are studying while TVET colleges is more of practical as they provide the students with practical skills they need because they render technical and vocational education and training.

The stigma associated with TVET colleges​ is because people think that University student has higher opportunities when in labor market than TVET colleges student.

Inconclusion the difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

Learn more about University and TVET college here:https://brainly.com/question/26696444

Which of the following activities do not involve Information Technology? *



A. Identification card theft

B.Dissemination of Information through social media

C. Listening to an mp3 device

D. Using a software to generate images​

Answers

Answer: B




hope it helps

what is memory? explain types of memory?​

Answers

Memory is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use. Memory is one of the basic functions of a computer, because without it, a computer would not be able to function properly. Memory is also used by a computer's operating system, hardware and software.

Answer:

Memory is the taking personal record of computer of past experience. The types of memory are 1)Read Only Memory 2)Random Access memory

Other Questions
In a standard 52card deck, half of the cards are red and half are black. The 52 cards are divided evenly into 4 suits: spades, hearts, diamonds, and clubs. Each suit has three face cards (jack, queen, king), and an ace. Each suit also has 9 cards numbered from 2 to 10.Suppose a solitaire player has played 600 games. Predict how many times the player turned over a red card as the first card.The player can expect to turn over a red card about _____ times. brainliest for a right answer Domain and range for exponential function y=3x what are these in english PLEASE HELP1. un caballo:2. las tortugas:3. el perro:4. un hurn:5. unas vacas: In this line of circles the eario of red circkles to blue circles is 1:3 how many more red circles would need to be added to make the ratio of red to blue 3:1 Can anyone explain to me what to do here? I've been looking at this for like..days and...I still don't get it... A uniform electric field exists in a region between two oppositely charged plates. An electron is released from rest at the surface of the negatively charged plate and strikes the surface of the opposite plate, 2.0 cm away, in a time 1.5 x 10-8 s. The speed of the electron in millions m/sec as it strikes the second plate is: A. 13.3 B. 133 C. 2.67 D. 26.7 E. 534 it is a set of points on given plane which is equidistant from a fixed point called the center What is the value of the expression. (-8+4)- (3-9) training for a cycle race in the first week if I was 195 miles in the second we can manage is 243 Miles what is the percentage increase in distance Why might the United States use international trade to import certain goods?plato/edmentum Sam Cooke:a. was blind from the age of 7.b. combined gospel music's ecstatic side with boogie-woogie.c. had a well-publicized drug addiction.d. had almost no influence on the course of rock-era music. Help me with Spanish Atrocities arecities devoted to astronomycruel actscharacter traitsscars on your skin Use the long division method to find the result when 4x-16x-21x+5 is divided by x-5? Dementia and delirium are very similar due to the fact that they both experience some form of memory loss. The difference between the two is that while memory loss in dementia __________, memory loss in delirium __________.A.affects all ages . . . affects only the elderlyB.can fluctuate throughout the day . . . is usually constantC.is a result from head injury . . . can result from high blood pressureD.is usually constant . . . can fluctuate throughout the dayANSWER IS D Asagais remark to Beneatha, That will be the problem for another time (line 22), conveys which of the following perspectives?(a) Global emergencies have no easy solution.(b) Large issues may be tackled in small stages.(c) Postponing an issue often results in its resolution.(d) Future achievements cannot be guaranteed.(e) Colonial oppression has far-reaching consequences. please help i dont know what im doing.. ill give brainly. Submit two documents: 1) your analysis is a news story, considering its component parts, and 2) your own news story that you wrote and analyzed. Angela has been brought up in a society that values an accumulation of assets, high income, and a high-prestige occupation. She has also been taught the value of hard work in a legitimate, legal line of work. However, Angela is finding it difficult to achieve any of this because of severe childhood poverty and trauma from living in a violent neighborhood. Angela's situation is an example of a. deterrence. b. anomie. c. strain. d. stigma. "These and similar cruelties these Christians have been for hundreds of years inflicting on our fathers and us in the dark. God has however, very recently published some of their secret crimes on the house top, that the world may gaze on their Christianity and see of what kind it is composed." Walker wrote these sentences about the new cruel laws in Georgia and Virginia. Based on these sentences, what did Walker likely hope would happen as a result of these laws becoming public?