1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
6

List of functional programming languages

Computers and Technology
1 answer:
11Alexandr11 [23.1K]3 years ago
7 0
<span><span>Python
</span><span>Haskell
</span><span>Perl
</span><span>Erlang
</span><span>Elixir
</span><span>Lisp
</span><span>Clojure
</span><span>Kotlin
</span><span>D
</span><span>R
</span><span>Sequence
TcL</span></span>
You might be interested in
Define Technology. Explain the term.​
aleksandrvk [35]

Answer:

Technology refers to methods, systems, and devices which are the result of scientific knowledge being used for practical purposes. Technology is changing fast. They should be allowed to wait for cheaper technologies to be developed.

7 0
3 years ago
Read 2 more answers
A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
lawyer [7]

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

8 0
3 years ago
What letter names the drive where windows most commonly stores data and programs?
Jobisdone [24]

Windows holds most of its data in the C: drive

5 0
4 years ago
LOLer was chatting online with l33ter. "I can't believe how lame some people are! :) I can get into any system by checking out t
Mkey [24]

Answer:

The answers are <em>"</em><em>hacker </em><em>and </em><em>hacking</em><em>"</em>

Explanation:

LOLer is an security hacker who uses computer bugs and other exploits to break into a company or personal network system by using their personal ingenuity and other accesses. Thus the process he described of getting into the company server details and getting peoples IP addresses and details on the company involves security hacking of the company network.

5 0
3 years ago
What password did the boss gave to the man?
lapo4ka [179]

Answer:

1947

Explanation:

because i dont know

7 0
3 years ago
Read 2 more answers
Other questions:
  • Wordwrap forces you to stop typing words and press the enter key at the end of each line.
    12·1 answer
  • What parts of the computer does it not need to function?​
    9·1 answer
  • Company XYZ has a new employee named John Anderson. His employee ID is XYZ1234. His email address will be <a href="/cdn-cgi/l/em
    10·1 answer
  • A ________ is a material deficiency, or combination of significant deficiencies, that results in more than a remote likelihood t
    6·1 answer
  • Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. Promp
    10·1 answer
  • A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
    8·1 answer
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • Can someone help me with python
    10·1 answer
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
  • Identify the end-to-end processes that should appear in the process landscape model.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!