1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
10

Consider the following methods:

Computers and Technology
1 answer:
elena55 [62]3 years ago
4 0
3. 8.1  
Looking at the functions "average", and "mystery" it's pretty obvious that "average" returns a double precision average of the value of an integer array. The function "mystery" returns an array of integers with each value in the array being the length of the string in the array of strings passed to "mystery" in the same ordinal position.  
The main body of the code initializes an array of strings and then passes that array to "mystery" who's output is then passed into the function "average". Since the lengths of the words passed to "mystery" is 7, 5, 6, 10, 10, 8, 13, 6, 8, 8, the sum will be 81, so the average will be 81/10 = 8.1 which matches option "3".
You might be interested in
How can we take picture in this app
Alex Ar [27]
When you ask a question there is a small camera roll sign on the bottom left and you can just add in the picture you want
7 0
4 years ago
. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Tod
horsena [70]

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = \frac{2^{N} }{2}

For a key length of 100, the total number of key combinations will be  \frac{2^{100} }{2} = 2^{99} combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

8 0
3 years ago
Combining two or more selected cells into one cell is called _____ cells.
Lisa [10]
The answer is group cells
7 0
3 years ago
Magnetic storage devices what matches this cd, hard disk, flash memory.
Rina8888 [55]
A hard disk. They use (often) multiple magnetic platters, or disks, and uses a tiny magnet to flip polarisation on the platter to write data.
8 0
3 years ago
Chemical equations of Carbon + water​
Setler79 [48]

Answer:

Aqueous carbon dioxide, CO2 (aq), reacts with water forming carbonic acid, H2CO3 (aq). Carbonic acid may loose protons to form bicarbonate, HCO3- , and carbonate, CO32-. In this case the proton is liberated to the water, decreasing pH. The complex chemical equilibria are described using two acid equilibrium equations.

PLS MARK AS BRAINLIEST

8 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • A "want" is very different than a "need'. What is a want?
    9·2 answers
  • What part of the System Model is a Flow Chart primarily developed for?
    9·1 answer
  • This is the thing that I don't understand why did they banned private chat like there are long-distance relationships, and frien
    13·2 answers
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • Olivia is trying to save for a new laptop computer. To help her save, she should start a _____. database financial statement per
    7·2 answers
  • A mobile phone is responding slowly and erratically for a user. The user has tried a soft reset on the device, but the phone con
    13·1 answer
  • Dany needs to fact check notes she took on 19th
    13·1 answer
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!