1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
8

Use NumPy to recreate your answer to Question 1b. The input parameters will both be python lists, so you will need to convert th

e lists into arrays before performing your operations. The output should be a numpy array.
Computers and Technology
1 answer:
Elina [12.6K]3 years ago
7 0

Answer:

//To install the python’s numpy module on you system use following command

pip install numpy

//To use numpy module, need to import it i.e.

  • import numpy as np

/*Python’s Numpy module provides a function numpy.array() to create a Numpy Array from an another array like object in python like list or tuple etc or any nested sequence like list of list */

  • numpy.array (object, dtype =None, copy=True, order='K', subok=False, nadmin = 0 )

//To create a Numpy Array from list just pass the list object to numpy.array()

  • npArray = np.array([1,2,3,4,5,6,7,8,9])  
  • print('Contents of the ndArray : ')
  • print(npArray)
You might be interested in
Which of the following commands appears in the INSERT menu or tab?
loris [4]

Answer:

Table

Explanation:

3 0
3 years ago
Please program this in Python.
Temka [501]

lst = ["Star Wars", "Movie 2", "Movie 3", "Movie 4"]

print(lst[0])

I wrote my code in python 3.8. Best of luck

5 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
What are the constraints of mine shaft head gear​
Serhud [2]

Answer:

Mine headgear constructions support wheel mechanisms for suspending winding cables that transport workers and ore up and down deep level shafts. These strange anthropomorphic structures have become the iconic symbol for mining.

4 0
3 years ago
you're adding new wires in your building for some new offices. the building has a false ceiling that holds the lights and provid
AlladinOne [14]

Based on the above, the  type of cable that need to be used by you is option B) Plenum rated cable.

<h3>What is plenum rated cable mean?</h3>

Plenum rated cable is known to be a kind of a cable that tends to have a unique form of insulation that is known to have low smoke and low flame attribute.

Note that the Plenum cable is one that need to be installed in any "air handling" space and as such, Based on the above, the  type of cable that need to be used by you is option B) Plenum rated cable.

Learn more about cable from

brainly.com/question/13258934

#SPJ1

See full question below

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use?

A) STP cables

B) Plenum rated cable

C) Cat 5e or Cat 6a cables

D) PVC jacketed cables

E) Fiber optic cables

6 0
1 year ago
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    14·2 answers
  • Marjorie is a 72-year-old woman who is having difficulties with cooking and bathing. Jorge provides Marjorie with tools and tech
    12·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • I need to know what is share market plssss
    8·2 answers
  • What is typescript can you please give me a description of what it is
    13·1 answer
  • List two major problems that could be addressed by futuring.
    15·1 answer
  • What is information communication technology?
    7·2 answers
  • Hello. I really need this done ASAP. Don't scroll down. JUst look please.
    14·2 answers
  • What is a major advantage of medical simulators?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!