1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
4 years ago
15

Write a function removeEvens to remove all the even numbers from input row array inRowArray which contains integer numbers. The

function removeEvens should use the mod internal function and operate on a row array of any length. Hint: Use logical indexing and the double square brackets []. Restriction: Do not use loops. For example:
inputRowArray = [1,2,3,4,5]

will produce 1 3 5

!Restrictions!

Is the correct result calculated for row array of random integers?

Is the mod function used?
Computers and Technology
1 answer:
diamong [38]4 years ago
5 0

Answer:

MATLAB code is given below

Explanation:

% Define the function.

function [ output_args] = removeEvens( input_args)

%UNTITLED Summary of this function goes here

% Detailed explanation goes here

%Remove the even number from the array using mod function.

output_args = input_args (mod(input_args,2)~=0);

%Display the message.

disp('odd Values are');

%Display the results.

disp(output_args);

%Terminate the function.

end

Function Call:

%Function Call

inputRowArray = [1,2,3,4,5]

removeEvens(inputRowArray)

You might be interested in
A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts wh
Gnesinka [82]

Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

<h3>What does an open connection implies?</h3>

Connecting to an open network is one that connote that one can opens their device to others using or on that same wireless network.

Note that Since the technician is testing a connector in a circuit with a voltmeter and the others, one can say that this indicates that the connector is open.

Learn more about open connection from

brainly.com/question/5338580

#SPJ1

7 0
2 years ago
A showChar Method
Lady bird [3.3K]

Answer: so I ask my teacher and this is what he said

Explanation:

4 0
3 years ago
I just downloaded an update for my laptop. Now, it doesn't give me a notification when the battery is low, and it just shuts off
givi [52]
Have you tried resetting it on your own first ? Although, it could just be a bug from this update (being something you can't solve until the next one) But you can try resetting it, or going to settings and clicking on battey, maybe the update turned that off ? Sometimes they do that, too! I hope all is well. ((:
7 0
3 years ago
Which of the following is NOT provided by the Device
guapka [62]

Answer:

well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance

of your machine

Explanation:

3 0
3 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Other questions:
  • "what do you perform when you want to recall specific records from a database"
    13·1 answer
  • How come the UAC pops up EVERY TIME after i gave it permission to make changes to my PC
    6·1 answer
  • A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
    14·1 answer
  • Movie that has a knife and shower​
    14·1 answer
  • When at the rightmost cell in a row, press the ENTER key to move to the first cell in the next row; do not press the TAB key
    6·1 answer
  • In the terms of OOP, in the microwave system, current time is a BLANK and change heat is a BLANK
    15·1 answer
  • The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before
    7·1 answer
  • what are the main technologies that have contributed to the growth and commercialization of the internet .​
    5·1 answer
  • Which coding manual contains three to seven character codes with a decimal after the third character
    11·1 answer
  • "a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!