1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
14

Implement a function that meets the specifications below.

Computers and Technology
1 answer:
Alex787 [66]3 years ago
4 0
Def sum_digits(s):  result=0;  isSummed=False;  for char in s:    if char=="0" or char=="1" or char=="2" or char=="3" or char=="4" or char=="5" or char=="6" or char=="7" or char=="8" or char=="9":      result+=int(char);      if not isSummed:        isSummed=True;  if not isSummed:    raise ValueError();  else:    return int(result);
You might be interested in
True/False
Gnom [1K]

Answer:

True

Explanation:

Since most database applications are Server-Client  structured, the User interface sits on the clients and the database sits in the server... when I say database I'm referring to the DBMS (Database Management System). A server is needed to host the DBMS and in turn it stores data from the UI and feeds data back to the UI based on the instruction written by the developer.

8 0
3 years ago
Aspire is a test you take to prepare for the<br> A. PSAT<br> B. SAT<br> C. ACT<br> D. FAFSA
just olya [345]

Answer:

ACT

Explanation:

"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing." - https://greentestprep.com/resources/act-prep/act-aspire-test/

5 0
3 years ago
Which of the following are disadvantages of networks? Check all of the boxes that apply.
RideAnS [48]

Answer:

• Network intruders can access all computers on a network.

• Networks are costly to set up.

Explanation:

A network can be defined as a connection between the internet and the computer. A network is a means by which information or data are transmitted from one computer to another.

We have various types of networks and some of them are:

a) Local Area Network (LAN)

b) Wireless Local Area Network (WLAN)

c) Wide Area Network (WAN)

d) Campus Area Network (CAN)

e) Metropolitan Area Network (MAN)

f) Personal Area Network (PAN) e.t.c

The disadvantages of network are:

a) Network intruders such as computer hackers can easily access all computers on a network.

b) Networks are costly to set up.

It is of outermost importance that a network used by a computer is secured using security such as encryption in other to prevent data loss , hackers and exposure of information that are sensitive to computer users.

4 0
3 years ago
Which Numpy function do you use to create an array? (Points : 1) np
ra1l [238]

Answer:

The correct option is np.array

Explanation:

Numpy is a library to perform numerical calculation in python. It allows us to create and modify vectors, and make operations on them easily. Numpy arrays are an excellent alternative to python lists. Some of the key advantages of numpy arrays are that they are fast, easy to work with, and offer users the opportunity to perform calculations through full arrays.

To start using numpy, the library must be imported:

import numpy as np

The most common way to create a vector or matrix already initialized is with the np.array function, which takes a list (or list of lists) as a parameter and returns a numpy matrix. The numpy arrays are static and homogeneous typing. They are more efficient in the use of memory.

Example:

list = [25,12,15,66,12.5]

v = np.array (list)

print (v)

6 0
3 years ago
What is edge computing?
Ilya [14]

Answer:

I basically means something like the cloud, where your data is uploaded to servers and is then processed and transferred back to you when you need it.

Explanation:

Hope this helps :)

5 0
3 years ago
Other questions:
  • Code
    7·1 answer
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • Which is a software configuration management concept that helps us to control change without seriously impeding justifiable chan
    14·1 answer
  • According to what theory did the universe expand explosively into existence 13.7 billion years ago?
    13·2 answers
  • A 200-g hockey puck is launched at an initial speed of 16 m/s up a metal ramp that is inclined at a 30° angle. The coefficients
    13·1 answer
  • 5 advantages in relation to virtual education in times of pandemic.
    10·1 answer
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!