1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
14

Identify any eight new programming languages and classify them based on their functionality.

Computers and Technology
2 answers:
Luden [163]3 years ago
5 0

<u>Eight new programming languages are:</u>

1) Go: Go rolled out in 2009. Go is designed by Google. It is highly influenced by C, Python, Smalltalk, Alef, CSP, Modula, Pascal, Limbo, and BCPL.

2) R Programming Language: R came out in 1993 and is somewhat popular these days. It is commonly used for data analysis and developing statistical software.

3) Groovy: Groovy came out in 2003 and was updated in 2007. It is an object-oriented language and is influenced by Python, Java, Smalltalk, Objective-C, and Perl.

4) Crystal: Crystal is an object-oriented language and is mostly used for web developing. It is influenced by C, Ruby, C#, and Python.

5) Rust: Rust is a system programming language and is similar to the C++ programming language. It is influenced by C#, Ruby, C++, Alef, Haskell, NIL, Cyclone, Limbo, and Erlang.

6) Elixir: Elixir is a programming language developed for the creation of real-time distributed applications. It is influenced by LFE, Clojure, Erlang, and Ruby.

7) Julia: Julia is a high-level programming language and it is used for numerical analysis and computational science. It is influenced by Fortran, Lisp, Lua, Python, Perl, Ruby, and MATLAB.

8) ELM: ELM is a programming language which is used for the web browser-based graphical user interfaces. It is influenced by Standard, ML, F#, Haskell, and Ocaml.

shepuryov [24]3 years ago
4 0

Answer:

Some of the new programming languages are R, Python, Haskell, Swift, C++, Java, Javascript and PHP.

However, you should know that in general sense there are three types of programming languages.

R is a pure object-oriented programming language being used for scientific purposes, and now it is being used extensively for machine learning as well.

Python is also a pure object-oriented programming language, and it is being used for mainly machine learning. However, you need to keep in mind that it supports the functional programming paradigm as well.

Haskell is a functional programming language and is the best in the functional paradigm as well. You can compare it with LISP, FORTRAN and PASCAL or COBOL, and you will find that Haskell is the best.

Swift is a pure object-oriented programming language, And by pure it means it never cheats anybody like if it says a variable is an int, it will be an int and not like C# here a string data type can be an integer data type. And this is not the correct thing. However, if you study in deep, you will find it is a necessary evil.

C++ and Java are imperative programming languages.

The Javascript and PHP are the scripting languages that support the object-oriented programming concepts but not fully, and they too fall under the imperative programming language list.

Explanation:

The answer is self explanatory.

You might be interested in
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
Why did latex replace wax?
andrezito [222]

Answer:

Latex replaced wax because it did the same thing and was used for the same things that wax would be used for

Explanation:

3 0
3 years ago
​________________________ are the main forms of direct and digital marketing. A. Mobile​ marketing, social media​ marketing, and
exis [7]

Answer:

A is the answer: Mobile marketing, Social media marketing and direct mail marketing

Explanation:

Option A is most likely correct because it is an intersection of both direct and digital marketing.

Option B is not the answer as direct response television marketing is listed

Option C is not the answer because online marketing and social media marketing belong to digital marketing while telemarketing belong the direct marketing

Option D is also not the answer as it just list the general category of marketing tools

Option E look like a good option but among the listed forms Social media marketing belong to digital marketing while telemarketing and kiosk marketing belong to digital marketing.

8 0
2 years ago
Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
wolverine [178]
I can solve it with Java. Here it is: 

areaOfSquare = stdin.nextDouble();
double sqrt = Math.sqrt(areaOfSquare);
if(Double.isNaN(sqrt)){
     System.out.print("INVALID");
} else {
     System.out.print(sqrt);
}
3 0
3 years ago
Why I/O modules is needed between system bus<br>and I/O devices?​
beks73 [17]

Answer:

1. Processor communication -- this involves the following tasks:

<em>a. exchange of data between processor and I/O module</em>

<em>b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc. </em>

<em>c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors. </em>

<em>d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address. </em>

<em />

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

5 0
3 years ago
Other questions:
  • What will be the value of ans after the following code has been executed?
    10·2 answers
  • Consider the following code segment.
    15·1 answer
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • What type of software testing is generally used in Software Maintenance?
    11·1 answer
  • What is problem scoping
    14·1 answer
  • HW2.24. Statement: Area of a Triangle The area of a triangle can be computed by knowing the base and height of the triangle usin
    11·1 answer
  • Identify when programmers use an Else statement.
    15·2 answers
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • How can the two independent clauses below be combined to form a correct complete sentence? Check all that apply.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!