Solved

Haskell Question

Posted on 2002-05-25
2
271 Views
Last Modified: 2011-09-20
Hi
I got a Haskell exam in a few days and doing the pastpaper of it. Since the anwer of it is not given it would be very helpful if anyone could check some of my answer which I am not sure about, and answer the questions which I have no idea...
Thank you very much
asukai



(a) What is a qualified type in Haskell?
My answer:
Qualified type is a type which consist of more than one type. For instance, Integral a=> a-> a is a qualified type where Integral is type class whose element is int and Integer.

(b) What are the types of the following Haskell functions?
(i) one x y = x < y
My answer:
Boolean
(ii) two x y = x + y
Real
(iii) three x y = xy
Real

(iv) four x y = x + + y
List
(v) five x y = x ! ! y
An element of List. Eq. (not sure)
(vi) six x y = x = = y
boolean.

(c) In the context of a functional programming language what is a homomorphism?

No idea.
(a) Discuss the advantages and disadvantages of pure functional programming
languages as compared with other sorts of language.

Advantages:
Good programming practise.
Simpler and shorter code.

Anything else?

Disadvantages:
Not flexible.
Strict Syntax. Need to specify type for each function.
Limited libeary.
It only deals with calculation problem.
Anything else?
0
Comment
Question by:asukai
2 Comments
 
LVL 6

Accepted Solution

by:
Triskelion earned 50 total points
ID: 7048259
0
 
LVL 54

Expert Comment

by:nico5038
ID: 7515112

No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
 - PAQ'd and pts removed
Please leave any comments here within the
next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

Nic;o)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
parentbit challenge 3 76
How to get boolean result of md5sum from two files in powershell 8 72
Looking for example pivot year code used in Y2K 4 62
Apps blocked by Java 9 64
This article is meant to give a basic understanding of how to use R Sweave as a way to merge LaTeX and R code seamlessly into one presentable document.
A short article about problems I had with the new location API and permissions in Marshmallow
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now