Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues

Answers

Answer 1

Answer:

Functions should be as pure as possible following a pattern of Input->Processing->Output

To model algorithms in a state-machine like format

Code free of side effects

Explanation:

Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.


Related Questions

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.

Human Resources can be classified into four groups namely________, ________, _______ and _____________.

A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz

Answers

Answer:

Option D

Explanation:

Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.

X = 10
y =
20
х» у
print("if statement")
print("else statement")

Answers

Answer:

"else statement"

Explanation:

Given

The above code segment

Required

The output of the program

Analyzing the program line by line, we have:

x = 10 ----> Initialize x to 10

y = 20 ----> Initialize y to 20

if x > y ----> check if x is greater than y

    print("if statement") ----> Execute this line if the condition is true

The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed

else

   print("else statement")

"else statement" without the quotes will be printed because the if condition is false

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

how do you create a formula in excel​

Answers

Answer:

You can create a simple formula to add, subtract, multiply or divide values in your worksheet. Simple formulas always start with an equal sign (=), followed by constants that are numeric values and calculation operators such as plus (+), minus (-), asterisk(*), or forward slash (/) signs.

Let's take an example of a simple formula.

On the worksheet, click the cell in which you want to enter the formula.

Type the = (equal sign) followed by the constants and operators (up to 8192 characters) that you want to use in the calculation.

For our example, type =1+1.

Notes:

Instead of typing the constants into your formula, you can select the cells that contain the values that you want to use and enter the operators in between selecting cells.

Following the standard order of mathematical operations, multiplication and division is performed before addition and subtraction.

Press Enter (Windows) or Return (Mac).

Let's take another variation of a simple formula. Type =5+2*3 in another cell and press Enter or Return. Excel multiplies the last two numbers and adds the first number to the result.

Use AutoSum

You can use AutoSum to quickly sum a column or row or numbers. Select a cell next to the numbers you want to sum, click AutoSum on the Home tab, press Enter (Windows) or Return (Mac), and that's it!

AutoSum on the Home tab

When you click AutoSum, Excel automatically enters a formula (that uses the SUM function) to sum the numbers.

Note: You can also type ALT+= (Windows) or ALT+ COMMAND += (Mac) into a cell, and Excel automatically inserts the SUM function.

Explanation:

HOPE IT HELPS

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

Choose all of the items that are important factors to consider for effective web design.

purpose

top-level domain name

content

visually appealing

audience

html

easy to use

Answers

Here's a list of the important factors to consider for effective web design:

PurposeTop-level domain nameContentVisually appealingAudienceHTMLEasy to use

What is Web Design?

Clever web design takes into account a range of factors, such as the objective of the website, the domain name, the quality of the content and the aesthetic elements, the intended audience, the HTML framework, and the ease of use. '

Having a clear comprehension of the goal of the website is crucial in determining the appropriate design strategy; in addition, a fitting domain name can positively impact branding efforts.

Compelling content captivates visitors. The visual aspect is a crucial factor in catching attention and improving the user's experience. Having an understanding of the intended viewers allows for customized creation and material presentation. The fundamental basis for organizing web pages is provided by HTML.

Read more about web design here:

https://brainly.com/question/25941596

#SPJ1

how can i get better at typing because i suck

Answers

Answer:

Keep typing until you get used to it ●___●

I tried this technique
I look at the keyboard to type a random word like multiple times and then I would try it without looking. If I did it I go on
Hope this helped *smiles*

the user cannot use a computer system without.................... software

Answers

Answer:

the user cannot use a computer system without hardware and software

Answer:

the user cannot use a computer system without.........hardware.....and...... software

With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match

Answers

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

application software can run without the presence of system software true or false ​

Answers

Answer:

false

...........

.....

does unturned game is good for low end PC that without graphics card?​

Answers

Answer:

What are your current PC specs and what operating system are you using?

Explanation:

Below are the minimum/recommended system requirements for Windows:

Minimum requirements:

OS: Windows 7 SP1+

Processor: 2 GHz

Memory: 4 GB RAM

DirectX: Version 10

Storage: 4 GB available space

Recommended Requirements:

OS: Windows 10 64-bit

Processor: 3 GHz

Memory: 8 GB RAM

DirectX: Version 11

Network: Broadband Internet connection

Storage: 6 GB available space

To  check your specs (Windows):

1. Right-click on the Windows start menu icon on the bottom left-hand side of your screen.

2. Click on ‘System’ in the menu that pops up.

3. Next to ‘Device/Windows Specifications’ it will list all the information

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

Answers

Answer:

technology standards

Explanation:

Technology standards can be regarded as standards that dish specifications that set up Product compability as well as communication capability in network, they give standards that are required in using technology in different areas such as teaching, business, IT network as well as learning. One of the body that Ado publish this is the International Society for Technology in Education( ISTE) which is a non profit membership association that regulate technology as regards educational technology.

It should be noted technology standards is Specifications that establish the compatibility of products and the ability to communicate in a network.

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

your organization has multiple remote offices. the users at the remote office often remotely connect to the application servers. which of the protocols should you enforce for encrypted communicationa

Answers

Answer:

RDP

SSH

Explanation:

RDP and SSH can both be used for remote encrypted communication. RDP protocol( called remote desktop protocol) is owned by Microsoft. It allows it's user access to the network through a GUI RDP software that allows you to connect to another computer on the network, the client server. RDPs operate over encrypted channels and is therefore secure.

SSH(called secure shell protocol) is used on Unix like OS systems to connect over unsecured network. SSH uses cryptographic encryption that increases security for it's client-server architecture. It's an improved version of RSH and Telnet which didn't make use of encryption when sending data over the network.

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

What framework is used for transporting authentication protocols instead of the authentication protocol itself

Answers

Answer:

EAP (Extensible Authentication Protocol)

For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.

What is the Extensible Authentication Protocol (EAP)?

An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.

RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.

For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.

More about the Extensible Authentication Protocol link is given below.

https://brainly.com/question/20813972

#SPJ12

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

open accomplishing your task I was able to​

Answers

Answer:

WTH KINDA QUESTION IS THIS !

I DON'T UNDERSTAND DUDE

Susan works for a company that values their employees me and deadlines in finding ways to keep the cost of doing business low what quality standard does Susan company value?

Answers

The correct answer to this open question is the following.

Although there are no options attached, we can answer the following.

Susan works for a company that values its employees and deadlines in finding ways to keep the cost of doing business low. The quality standard that Susan's company values is "efficiency."

The company where Susan works is focused on the efficiency of all systems and procedures of the organization. This trait allows the company to also be productive, getting all the work in time. So we could say that Susan's company values efficiency and effectiveness.

Leaders of these kinds of organizations should be great communicators and good listeners to perform under pressure.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False

Answers

answer
True
explain



The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:

The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.

Therefore, the final answer is "True".

Learn more:

brainly.com/question/1212286

A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.

Answers

Answer:

tictactoe[1][1]

Explanation:

To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::

Given a 2 - dimensional 3×3 array of integers :

Creating a dummy array assigned to the variable tictactoe :

[1 2 3]

[4 5 6]

[7 8 9]

We have a 3×3 array, that is 3 rows and 3 columns.

The middle element in the middle row is located in the second row ;second colum

Row and column Indexes starts from 0

Middle element in the middle row is the value 5 and it corresponds to :

tictactoe[1][1]

We call the variable name and the we use one square box each to house the row and column position.

__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies.

Answers

The answer is “a security event”
Other Questions
what is it called when people or businesses move to an area to invest money in housing and services, which in turn creates more jobs and attracts more people? There are a handful of common mistakes people make when trying toseparate skill from chance. Which of the following is not one of those mistakes?a. Hindsight biasb. Outcome biasc. Loss aversiond. Narrative seeking For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache. Operation Address Hit? Read value (or unknown)Read 0x834Write 0x 836Read 0xFFD HELP ASAP 10 POINTS AND BRAINLIST HURRY AND WILL GIVE 5 STAR AND A THANKS Four major breakfast cereal companies share a majority of the cereal market: Kellogg, Post, General Mills, and Quaker. This is an example of why was sara not interested in learning french language ? Please Help NO LINKSUse cylindrical shells to find the volume of the solid obtained by rotating the region bounded by y=x2 , y=0 , and x=9, about the y -axis.V= Which environmental factor has the most influence on your eating habits?O restaurants providing large portionsfood deficient in sugar and fatsO people ridiculing your body typemedia stars with muscular bodies what is equivalent to x-2(3x-1)=3x What is the value of x in the equation 1x - y = 30, when y = 1524880200 Write the solution set of the equation x2 4=0 in roster form bansang sumakop sa indo-china Ziyi believes that she cannot master Spanish. She avoids doing her Spanish homework and does not study for Spanish tests since she believes she will not do well. According to Bandura, Ziyi is most likely low in ____. using the cpt code book, assign code(s) for the following scenario: Dr. Smith admits Ralph to a nursing home. He performs a comprehensive history, comprehensive examination and medical decision making of high complexity. Code for the initial visit for admission of a patient to a nursing home. List the CPT code verified in the Tabular List. Who is sometimes referred to as the Columbus of statistics because his book made a fundamental contribution by attempting to demonstrate the quantitative characteristics of birth and death data Ling must spend no more than $40.00 on decorations for a party. She has spent $10.00 on streamers and wants to buy bags of balloons as well. Each bag of balloons costs $2.50. The inequality below represents x, the number of bags she can buy given the spending limit and how much she has already spent on streamers.10 + 2.5 x less-than-or-equal-to 40Which best describes the number of bags of balloons she can buy? Which of the following shows the graph of y = 4^x + 3? Consider the markets for tap water, bottled water, cola, and beer. Assume there is only one provider of tap water, bottled water manufacturers use advertising to differentiate their products, cola producers engage in strategic pricing behavior, and the beer market is largely controlled by only a few firms. Classify the market for each of the following drinks as either monopoly, oligopoly, monopolistic competition, or perfect competition. Monopoly Oligopoly Monopolistic Competition Perfect Competition Tap water Bottled water Cola Beer Helppp and explain pls and thankyou Why the water is an inorganic, transparent, tasteless, odorless, and nearly colorless chemical substance?