1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
9

Describe and compare imperative (C), functional (SML) and logic (Prolog) programming paradigms.

Computers and Technology
1 answer:
daser333 [38]3 years ago
6 0

Answer:

Answered below

Explanation:

Imperative programming paradigm is a paradigm in which the programmer tells the machine how to change its state. It is divided into procedural programming, where programs are grouped as procedures, and object-oriented, where programs are grouped together with the properties they operate on.

Imperative paradigm is efficient, familiar and popular compared to others.

Functional programming paradigm implements all instructions as functions, in a mathematical sense. They take on an argument and return a single solution. The advantage of this, compared to other paradigms, is its abstraction and independence.

Logical programming, like functional programming, incorporates a declarative approach to problem solving. All known facts are first established before queries are made. Advantage of this paradigm is that programming steps are kept to a minimum.

You might be interested in
Which soft skill involves the ability to produce ideas that will give an organization an advantage with respect to other organiz
KiRa [710]

B.  Strategic thinking

<u>Explanation:</u>

Strategic thinking helps to come up with great ideas that makes the company  better than the other company. One can apply strategic thinking to arrive at decisions that can be related to your work or personal life. Strategic thinking involves developing an entire set of critical skills. Strategic thinking enables a business owner to determine how to use these resources most effectively and advance the company toward its objectives. Strategic thinking focuses the management team on markets that are most likely to succeed.

5 0
3 years ago
Can someone who is good at 9th class IT (cbsce) can help me in my homework​
postnew [5]

Answer: yeah

Explanation:

4 0
3 years ago
________ reveals functional requirements regarding the exchange of data and services between systems.
77julia77 [94]
The answer to this question is b
4 0
2 years ago
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
1 year ago
Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for
tankabanditka [31]

Answer:

The solution is implemented in python:

numnames = int(input("Number of Names: "))

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

names = []

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

Explanation:

This prompts user for number of names

numnames = int(input("Number of Names: "))

This lists the name titles in a list

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

This initializes an empty list

names = []

The following for loop get names from the user

<em>for i in range(numnames):</em>

<em>    name = input(nametitle[i])</em>

<em>    names.append(name)</em>

   

The following instructions print the user fullnames

<em>print("Your fullname is: ",end=" ")</em>

<em>for i in names:</em>

<em>    print(i,end=" ")</em>

5 0
2 years ago
Other questions:
  • What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
    14·1 answer
  • What is the last step in conducting url search
    11·1 answer
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • What is the name of the organization responsible for assigning public ip​ addresses?
    13·1 answer
  • ____ are the computers that store network software and shared or private user files.
    6·1 answer
  • A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the atte
    14·1 answer
  • your brother has made a battery operated torch by using 2 cells &amp; has come to ask you how he may make the torch more powerfu
    5·1 answer
  • When Twitter is used to gather a large group for a face-to-face meeting it is called
    10·1 answer
  • Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​
    14·1 answer
  • which tool in administrative tools should you open if you want to view messages to troubleshoot errors? a. resource monitor b. e
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!