1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
9

Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.

Computers and Technology
1 answer:
frozen [14]3 years ago
4 0

Answer:Eiffel programming

Explanation: Eiffel programming language was base on object-oriented pattern and developed by Betrand Meyer in 1986.This helps in creating the software modules that can be used again and is reliable as well.

This language was not considered as type safe because it could execute the operation on any particular object which is considered invalid on it.This language lacks about ensuring the program that are written are well defined or not.

You might be interested in
What are common tasks Human Services workers perform? Check all that apply.
Ainat [17]

Answer: B, D, E, F

Explanation:

I got I right.

7 0
3 years ago
Read 2 more answers
You can access various sites on the www by using hyperlinks or by
svetlana [45]
Typing in the site address?

Hope this helped!
5 0
3 years ago
It is true or false Nowadays computer games are mostly available on external hard disk.​
NISA [10]

Answer:

false

Explanation:

because we're playing it on a mobile phone and a laptop than the hard disk. the hard disk is so old to use it nowadays.

7 0
3 years ago
I REALLY NEED HELP WITH THIS ASSIGNMENT. IT WOULD BE GREATLY APPRECIATED IF SOMEONE HELPED ME. I'M NOT GOOD AT COMPUTER SCIENCE
melomori [17]

Answer:

Explanation:

i cant view it

8 0
3 years ago
Read 2 more answers
To include a table into a document, a user will need to navigate to the _____<br> tab.
zaharov [31]

Answer:

Insert Tab

Explanation: Hope this helps you :D

8 0
2 years ago
Other questions:
  • In steps<br> Urgent please
    14·1 answer
  • __________ refers to excavating the sides of an excavation to form one or a series of horizontal levels or steps, usually with v
    12·2 answers
  • Once Google Analytics processes data, it’s stored in a database where it can’t be modified.
    9·1 answer
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • Suppose I create a new kind of Java object, called "Kangaroo". Further suppose that at any given time, all instances of this new
    6·1 answer
  • Which of the following specific components are incorporated on HDInsight clusters?
    13·1 answer
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have
    15·1 answer
  • What three files do you need to perform a mail merge?<br><br> HELP ASAP PLEASE!!
    10·1 answer
  • Any mobile devices contain a(n) ___ and gyroscope that can sense even the smallest movements.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!