1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
9

Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.

Computers and Technology
1 answer:
frozen [14]3 years ago
4 0

Answer:Eiffel programming

Explanation: Eiffel programming language was base on object-oriented pattern and developed by Betrand Meyer in 1986.This helps in creating the software modules that can be used again and is reliable as well.

This language was not considered as type safe because it could execute the operation on any particular object which is considered invalid on it.This language lacks about ensuring the program that are written are well defined or not.

You might be interested in
It is the job of the _____ to convert between 8-bit-wide digital data and 1-bit-wide digital data.
suter [353]
Multiplexer. A mux converts mutiple inputs into fewer outputs, for example combined with an address bus. Then the address bus decides which part of the input is linked to the output, so the inputs use the outputs each at a different point in time (=time division multiplexing)
3 0
4 years ago
describe in your words how you think computer instruction design correlates with memory access ? the chapter also compares the d
AveGali [126]

The computers operate with great speed and only run one process at once. The fastest storage of all is the cache memory. Random Access Memory is in second place, and the hard drive is in third.

What is computers?
A computer is a digital electrical device that may be configured to automatically perform series of logical or mathematical operations (computation). Programs are generic sets of actions that can be carried out by modern computers. These apps give computers the ability to carry out a variety of tasks. A computer system is a "complete" system that comes with the peripheral devices, operating system, and hardware required for "full" functioning. This phrase may also apply to a collection of connected computers that work as a unit, such as a computer network a computer cluster.

Computers are used as control systems in a wide variety of industrial and consumer goods.

To learn more about computer
brainly.com/question/23275071
#SPJ4

8 0
1 year ago
The process of securely erasing a hard drive
Citrus2011 [14]
The process of securely erasing a hard drive is called formatting. Formatting is where you delete all the files in your drive and making sure that it is secure. When you format your drive, it erases all the data even viruses stored in your drive. So most of the time, when an IT person thinks that his computer has virus, one option that he can do is do the formatting to make sure that his computer is clean when he reuse it again the next time.
6 0
3 years ago
Have you ever been presented to someone else's home page of a given website?​
worty [1.4K]

Answer: No, is this the question?

Explanation: Have a stupendous day! <3

6 0
3 years ago
Which type of dimensioning exactly defines the given statement?
mart [117]
<h2><em><u>A</u></em><em><u>n</u></em><em><u>s</u></em><em><u>w</u></em><em><u>e</u></em><em><u>r</u></em><em><u>:</u></em></h2><h3><em>I</em><em>n</em><em> </em><em>a</em><em> </em><em>t</em><em>e</em><em>c</em><em>h</em><em>n</em><em>i</em><em>c</em><em>a</em><em>l</em><em> </em><em>d</em><em>r</em><em>a</em><em>w</em><em>i</em><em>n</em><em>g</em><em>,</em><em>a</em><em> </em><em>b</em><em>a</em><em>s</em><em>i</em><em>c</em><em> </em><em>d</em><em>i</em><em>m</em><em>e</em><em>n</em><em>s</em><em>i</em><em>o</em><em>n</em><em> </em><em>i</em><em>s</em><em> </em><em>a</em><em> </em><em>t</em><em>h</em><em>e</em><em>o</em><em>r</em><em>e</em><em>t</em><em>i</em><em>c</em><em>a</em><em>l</em><em>l</em><em>y</em><em> </em><em>e</em><em>x</em><em>a</em><em>c</em><em>t</em><em> </em><em>d</em><em>i</em><em>m</em><em>e</em><em>n</em><em>s</em><em>i</em><em>o</em><em>n</em><em> </em><em>,</em><em>g</em><em>i</em><em>v</em><em>e</em><em>n</em><em> </em><em>f</em><em>r</em><em>o</em><em>m</em><em> </em><em>a</em><em> </em><em>d</em><em>a</em><em>t</em><em>u</em><em>m</em><em> </em><em>t</em><em>o</em><em> </em><em>a</em><em> </em><em>f</em><em>u</em><em>t</em><em>u</em><em>r</em><em>e</em><em> </em><em>o</em><em>f</em><em> </em><em>i</em><em>n</em><em>t</em><em>e</em><em>r</em><em>e</em><em>s</em><em>t</em><em>.</em></h3>

<h2><em><u>E</u></em><em><u>x</u></em><em><u>p</u></em><em><u>l</u></em><em><u>a</u></em><em><u>n</u></em><em><u>a</u></em><em><u>t</u></em><em><u>i</u></em><em><u>o</u></em><em><u>n</u></em><em><u>:</u></em></h2><h2><em>I</em><em> </em><em>H</em><em>O</em><em>P</em><em>E</em><em> </em><em>I</em><em>T</em><em> </em><em>H</em><em>E</em><em>L</em><em>P</em><em> </em><em>T</em><em>Y</em><em>S</em><em>M</em><em>!</em></h2>

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.
    11·1 answer
  • Write a program that reads a series of strings andprints only those strings beginning with the letter "b."
    7·1 answer
  • What color is the highway sign that indicates restaurant?
    12·1 answer
  • Describe a game that you have played (video game or other type of game) that had a good balance between being easy to learn the
    6·1 answer
  • PI
    12·1 answer
  • I don't understand this
    10·1 answer
  • Whats your favorite thing about tech
    11·2 answers
  • Project: Digital Media and Business
    9·1 answer
  • Python Programming
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!