1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
4 years ago
10

In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o

f pie most people eat in a year. Set up an integer array that can hold responses from 30 people. For each person, enter the number of pieces they say they eat in a year. Then write a function that finds the mode of these 30 values. This will be the number of pie slices eaten by the most people. The function that finds and returns the mode should accept two arguments, an array of integers, and a value indicating how many elements are in the array.

Computers and Technology
1 answer:
Feliz [49]4 years ago
6 0

Answer:

  see below

Explanation:

The program of interest is the function "findMode[x, n]" in the attached. It is written the Wolfram Language of Mathematica.

The basic idea is that the data in the array is sorted. The sorted array is partitioned into sets of identical elements, and the number in each of those sets is counted. The maximum of those counts is the mode. The location of the maximum count corresponds to the location of the set having that count. We use that location information to pull out the mode value(s).

If there is more than one mode, all are reported.

__

An example data array is provided, along with the program output.

You might be interested in
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer. It pro
V125BC [204]

Answer: Operating system

Explanation:

  A computer's OS (operating system) is one of the type of computer software and the main function of an operating system is that it helps in managing the hardware, processes, memory and the software of the computer application.

 An operating system basically providing the set of instruction to the computer for the communication purpose and perform various types of task in the computer system.

According to the given question, an operating system is refers to the software program that helps in coordinating all the task and the activities in the computer system.        

 Therefore, Operating system is the correct answer.

3 0
3 years ago
What are examples of scanning devices?
eimsori [14]

Here the examples of scanning devices :

  • Drum Scanner.
  • Handheld Scanner.
  • Flatbed Scanner.
  • Optical Character Recognition.
  • Magnetic Ink Character Recognition.
  • Image Scanner.

<h3>What is meant by scanning ?</h3>
  • A text is scanned quickly in order to find a specific piece of information. In daily life, scanning is regularly used for tasks like looking up a word in a dictionary or finding a friend's name in your phone's contacts list.
  • Scanners may basically be divided into three categories. These consist of network scanning, port scanning, and vulnerability scanning.
  • There are three different types of scanners: portable scanners, flatbed scanners, and drum scanners. While flatbed scanners are commonly used in offices and classrooms, drum scanners are mainly used in the publishing industry to print high-quality pictures.
  • Three processes make up the basic scanning process: scan, register, and detail.

Learn more about scanning refer to :

brainly.com/question/25106178

#SPJ4

4 0
1 year ago
A reason to overload the ________ is to write classes that have array-like behaviors. parentheses ( ) operator curly braces { }
Georgia [21]

Answer:

square brackets [ ] operator

Explanation:

<h2><u>Multiple choice</u></h2>

A reason to overload the<u> square brackets [ ] operator </u> is to write classes that have array-like behaviors

5 0
3 years ago
Translating an algorithm into the syntax of Java is the design phase of software development.
Digiron [165]

Answer:

I think it's false

Explanation:

I don't think so. What makes me hesitate is that you may have been told that in your text or in the classroom.

Here are the steps as I understand them.

  1. Understand the problem you are trying to solve.
  2. Design a solution.
  3. Draw a flow chart.
  4. Write pseudo-code.
  5. Write code.
  6. Test and debug.

I think you've done the designing long before you start writing code or even pseudo-code.

4 0
3 years ago
Other questions:
  • ____ convert a program design developed by a systems analyst or software developer using one of many computer languages.
    10·1 answer
  • If you have a long title for a table and need it to span several cells, you can use A. Merge Cells. B. Split Cells. C. Insert Co
    5·1 answer
  • The ____ provides access to the Internet may also be internal.
    14·2 answers
  • The purchase of one cup of coffee a day what's going to do
    15·2 answers
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Why is it important to evaluate the website on which you plan to shop?
    7·2 answers
  • Which of the following statements is correct?
    11·1 answer
  • According to Alisa Miller, why does news focus so heavily on celebrities?
    5·1 answer
  • Who is the king of computers?
    8·2 answers
  • you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. whi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!