1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
6

List of functional programming languages

Computers and Technology
1 answer:
11Alexandr11 [23.1K]3 years ago
7 0
<span><span>Python
</span><span>Haskell
</span><span>Perl
</span><span>Erlang
</span><span>Elixir
</span><span>Lisp
</span><span>Clojure
</span><span>Kotlin
</span><span>D
</span><span>R
</span><span>Sequence
TcL</span></span>
You might be interested in
Assume that a large number of consecutive IP addresses are available starting at 198.16.0.0 and suppose that two organizations,
Fiesta28 [93]

Answer & Explanation:

An IP version 4 address is of the form w.x.y.z/s

where s = subnet mask

w = first 8 bit field, x = 2nd 8 bit field, y = 3rd 8 bit field, and z = 4th 8 bit field

each field has 256 decimal equivalent. that is

binary                                        denary or decimal

11111111      =        2⁸      =             256

w.x.y.z represents

in binary

11111111.11111111.11111111.11111111

in denary

255.255.255.255

note that 255 = 2⁸ - 1 = no of valid hosts/addresses

there are classes of addresses, that is

class A = w.0.0.0 example 10.0.0.0

class B = w.x.0.0 example 172.16.0.0

class C = w.x.y.0 example 198.16.8.1

where w, x, y, z could take numbers from 1 to 255

Now in the question

we were given the ip address : 198.16.0.0 (class B)

address of quantity 4000, 2000, 8000 is possible with a subnet mask of type

255.255.0.0 (denary) or

11111111.11111111.00000000.00000000(binary) where /s =  /16 That is no of 1s

In a VLSM (Variable Length Subnet Mask)

Step 1

we convert the number of host/addresses for company A to binary

4000 = 111110100000 = 12 bit

step 2 (subnet mask)

vary the fixed subnet mask to reserve zeros (0s) for the 12 bit above

fixed subnet mask: 11111111.11111111.00000000.00000000            /16

variable subnet mask: 11111111.11111111.11110000.000000                /20

now we have added 4 1s in the 3rd field to reserve 12 0s

<u><em>subnet mask: 255.255.</em></u><u><em>16.</em></u><u><em>0 (where the 1s in each field represent a denary number as follows)</em></u>

<u><em>1st 1 = 128, 2nd 1 = 64 as follows</em></u>

<u><em>1        1       1      </em></u><u><em> 1 </em></u><u><em>      1     1     1     1</em></u>

<u><em>128  64     32    </em></u><u><em>16</em></u><u><em>    8    4     2    1</em></u>

step 3

in the ip network address: 198.16.0.0/19 <em>(subnet representation)</em> we increment this using 16

that is 16 is added to the 3rd field as follows

That means the ist Valid Ip address starts from

          Ist valid Ip add: 198.16.0.1 - 198.16.15.255(last valid IP address)

Company B starts<u><em>+16: 198.16.</em></u><u><em>16</em></u><u><em>.0 - 198.16.31.255</em></u>

<u><em>                   +16: 198.16.</em></u><u><em>32</em></u><u><em>.0- 198.16.47.255 et</em></u>c

we repeat the steps for other companies as follows

Company B

Step 1

we convert the number of host/addresses for company B to binary

2000 = 11111010000 = 11 bit

Step 2

vary the fixed subnet mask to reserve zeros (0s) for the 11 bit above

fixed subnet mask: 11111111.11111111.00000000.00000000            /16

variable subnet mask: 11111111.11111111.11111000.000000                /21

now we have added 5 1s in the third field to reserve 11 0s

<u><em>subnet mask: 255.255.</em></u><u><em>8.</em></u><u><em>0 (where the 1s in each field represent a denary number as follows)</em></u>

<u><em>1st 1 = 128, 2nd 1 = 64 as follows</em></u>

<u><em>1        1       1       1       </em></u><u><em>1 </em></u><u><em>    1     1     1</em></u>

<u><em>128  64     32    16    </em></u><u><em>8 </em></u><u><em>   4     2    1</em></u>

Step 3

Starting from after the last valid Ip address for company A

in the ip network address: 198.16.16.0/21 (<em>subnet representation</em>) we increment this using 8

That means the ist Valid Ip address starts from

           Ist valid Ip add: 198.16.16.1 - 198.16.23.255(last valid IP address)

Company C starts <u><em>+16: 198.16.</em></u><u><em>24</em></u><u><em>.0- 198.16.31.255</em></u>

<em>                             </em><u><em> +16: 198.16.</em></u><u><em>32</em></u><u><em>.0- 198.16.112.255 et</em></u>c

Company C

Step 1

we convert the number of host/addresses for company C to binary

4000 = 111110100000 = 12 bit

Step 2

vary the fixed subnet mask to reserve zeros (0s) for the 12 bit above

fixed subnet mask: 11111111.11111111.00000000.00000000            /16

variable subnet mask: 11111111.11111111.11110000.000000                /20

now we have added 4 1s in the 3rd field to reserve 12 0s

<u><em>subnet mask: 255.255.</em></u><u><em>16.</em></u><u><em>0 (where the 1s in each field represent a denary number as follows)</em></u>

<u><em>1st 1 = 128, 2nd 1 = 64 as follows</em></u>

<u><em>1        1       1       1       1     1     1     1</em></u>

<u><em>128  64     32    16    8    4     2    1</em></u>

Step 3

Starting from after the last valid ip address for company B

in the ip network address: 198.16.24.0/20 (subnet representation) we increment this using 16

That means the ist Valid Ip address starts from

           Ist valid Ip add: 198.16.24.1 - 198.16.39.255(last valid IP address)

Company C starts <u><em>+16: 198.16.40.0- 198.16.55.255</em></u>

<em>                          </em><u><em>    +16: 198.16.56.0- 198.16.71.255 et</em></u>c

Company D

Step 1

we convert the number of host/addresses for company D to binary

8000 = 1111101000000 = 13 bit

Step 2

vary the fixed subnet mask to reserve zeros (0s) for the 13 bit above

fixed subnet mask: 11111111.11111111.00000000.00000000            /16

variable subnet mask: 11111111.11111111.11100000.000000                /19

now we have added 3 1s in the 3rd field to reserve 13 0s

<u><em>subnet mask: 255.255.</em></u><u><em>32.</em></u><u><em>0 (where the 1s in each field represent a denary number as follows)</em></u>

<u><em>1st 1 = 128, 2nd 1 = 64 as follows</em></u>

<u><em>1        1      </em></u><u><em> 1 </em></u><u><em>      1       1     1     1     1</em></u>

<u><em>128  64     </em></u><u><em>32  </em></u><u><em>  16    8    4     2    1</em></u>

Step 3

Starting from after the last valid ip address for company C

in the ip network address: 198.16.40.0/20 (subnet representation) we increment this using 32

That means the ist Valid Ip address starts from

           Ist valid Ip add: 198.16.40.1 - 198.16.71.255(last valid IP address)

Company C starts <u><em>+16: 198.16.72.0- 198.16.103.255</em></u>

<em>                          </em><u><em>    +16: 198.16.104.0- 198.16.136.255 et</em></u>c

5 0
3 years ago
An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme
Valentin [98]

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

3 0
2 years ago
Exercise 8.1.9: Diving Contest Your school is hosting a diving contest, and they need a programmer to work on the scoreboard! Yo
vampirchik [111]

Answer:

def calculate_score(theTuple):

    first, second, third = theTuple

    if first >= 0 and first <=10 and second >= 0 and second <=10 and third >= 0 and third <=10:

         print(first + second+third)

    else:

         print("Range must be 0 to 10")

Explanation:

This line defines the function

def calculate_score(theTuple):

This line gets the content of the function

    first, second, third = theTuple

The following if condition checks if the digits are in the range 0 to 10

    if first >= 0 and first <=10 and second >= 0 and second <=10 and third >= 0 and third <=10:

This calculates the sum

         print(first + second+third)

else:

If number is outside range 0 and 10, this line is executed

         print("Range must be 0 to 10")

4 0
3 years ago
An Operating System is an application just like any other applications we use on our computers. What makes an Operating System s
tatyana61 [14]

Answer: An operating system(OS) is an interface between the hardware and the user. An OS is built so that it could support other software. OS is a system software which is used to support other application softwares.

Explanation:

An operating system handles all the hardware of the system and allows users access to those hardware components with the help of application softwares.

An OS consist of many libraries and APIs which allows programmers to write and execute codes. There are many types of OS such as real time, multitasking, multi programming OS.

The OS is responsible for allocating memory, managing the hardware, distributing resources across different processors in an distributed system.

So all these features makes them different from application software. The OS is responsible allocating memory and hardware resources to these softwares.

3 0
3 years ago
V.kofiryfh givnyovb (to slove you must go back 3 letters)
Elena L [17]
Im goin to be honest with you i dont understand this question at all can you xplain it alittle more plz cuz if i go back three letters it is o
7 0
2 years ago
Other questions:
  • Trish uas bought a new computer, which she plans to start working on aftwr a week. Since Trish has not used computers in the pas
    13·1 answer
  • A local reaction will occur at the site of the exposure, such as irritations or damage to the skin, eyes or lungs true or flase
    14·1 answer
  • When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your _____
    8·2 answers
  • Your task is to write a C program that measures the latencies of various system calls. In particular, you want to know 1) the co
    5·1 answer
  • Describe the difference between a myth and a fable.
    12·1 answer
  • Where does the turtle belong in the cladogram shown below?<br> I’LL GIVE YOU BRAINLYEST
    6·2 answers
  • In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a si
    8·1 answer
  • The main difference between \f and \r is that \f produces a
    13·1 answer
  • Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
    11·1 answer
  • What is the output for the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!