1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
4 years ago
15

Write a function removeEvens to remove all the even numbers from input row array inRowArray which contains integer numbers. The

function removeEvens should use the mod internal function and operate on a row array of any length. Hint: Use logical indexing and the double square brackets []. Restriction: Do not use loops. For example:
inputRowArray = [1,2,3,4,5]

will produce 1 3 5

!Restrictions!

Is the correct result calculated for row array of random integers?

Is the mod function used?
Computers and Technology
1 answer:
diamong [38]4 years ago
5 0

Answer:

MATLAB code is given below

Explanation:

% Define the function.

function [ output_args] = removeEvens( input_args)

%UNTITLED Summary of this function goes here

% Detailed explanation goes here

%Remove the even number from the array using mod function.

output_args = input_args (mod(input_args,2)~=0);

%Display the message.

disp('odd Values are');

%Display the results.

disp(output_args);

%Terminate the function.

end

Function Call:

%Function Call

inputRowArray = [1,2,3,4,5]

removeEvens(inputRowArray)

You might be interested in
In the airline industry, frequent flyer programs, ticket kiosks, and e-ticketing are all examples of capabilities that are _____
crimeas [40]

Answer:

valuable; rare

Explanation:

A valuable capability is that which gives a firm some competitive advantage. Core competencies are the operational activities that a company does best. A business’s core competencies are what distinguish it from other rival companies in its industry. While Rare capabilities are capabilities that a small amount of, if any, competitors possess. Those type of capabilities that are costly or impossible to imitate.

from the above explanation we can deduce that the modern technology implementation in the airline industry has made it possible to have valuable ptograms and softwares for carring out several task which are no longer scarce to procure.

7 0
3 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
3 years ago
Consider a student club or organization in which you are a
lakkis [162]

Answer:

Entity Relationship Diagram (ERD):

An ERD is an abstract data model to represent real world entities and their relationship to each other. ERD data schemas are used to define what data is important to processes in graphical form.

4 0
2 years ago
What is a good practice to remember when adding transitions to a presentation?
storchak [24]

Answer:

A. Use one type of transition throughout.

Explanation:

Edge 2021.

7 0
3 years ago
Read 2 more answers
In programming 5/2 is an example of what math?
wlad13 [49]

Answer:

division

Explanation:

/ in programming language is divide ÷

6 0
2 years ago
Read 2 more answers
Other questions:
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • I don’t understand the double8 coding problem. It is Java
    15·1 answer
  • What type of waves in the electromagnetic spectrum has the Search for Extraterrestrial Intelligence (SETI) mostly analyzed in th
    15·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • Why does this website have so many copies of plagiarism?
    5·1 answer
  • Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
    10·1 answer
  • Take any software or Application that you have recently purchased, this can be a video game or any other application helping you
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!