Answer:
a. ∀x (User(x) → (∃y (Mailbox(y) ∧ Access(x, y))))
b. FileSystemLocked → ∀x Access(x, SystemMailbox)
c. ∀x ∀y ((Firewall(x) ∧ Diagnostic(x)) → (ProxyServer(y) → Diagnostic(y))
d. ∀x (ThroughputNormal ∧(ProxyServer(x)∧ ¬Diagnostic(x))) → (∃y Router(y)∧Functioning(y))
Step-by-step explanation:
a)
Let the domain be users and mailboxes. Let User(x) be “x is a user”, let Mailbox(y) be “y is a mailbox”, and let Access(x, y) be “x has access to y”.
∀x (User(x) → (∃y (Mailbox(y) ∧ Access(x, y))))
(b)
Let the domain be people in the group. Let Access(x, y) be “x has access to y”. Let FileSystemLocked be the proposition “the file system is locked.” Let System Mailbox be the constant that is the system mailbox.
FileSystemLocked → ∀x Access(x, SystemMailbox)
(c)
Let the domain be all applications. Let Firewall(x) be “x is the firewall”, and let ProxyServer(x) be “x is the proxy server.” Let Diagnostic(x) be “x is in a diagnostic state”.
∀x ∀y ((Firewall(x) ∧ Diagnostic(x)) → (ProxyServer(y) → Diagnostic(y))
(d)
Let the domain be all applications and routers. Let Router(x) be “x is a router”, and let ProxyServer(x) be “x is the proxy server.” Let Diagnostic(x) be “x is in a diagnostic state”. Let ThroughputNormal be “the throughput is between 100kbps and 500 kbps”. Let Functioning(y) be “y is functioning normally”.
∀x (ThroughputNormal ∧(ProxyServer(x)∧ ¬Diagnostic(x))) → (∃y Router(y)∧Functioning(y))