1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
7

Plz help me of this answerlanguage:python​

Computers and Technology
2 answers:
lozanna [386]3 years ago
6 0

Answer:

The output of this code after execution is 2

Explanation:

In the code that is given in picture first of all variable 'x' is assigned to value 3 and then another variable  'num' is assigned to value 17. After the print statement is printing the value of 'num' modulus(%)  'x' which is 2. Modulus is mathematical operator which calculates the remainder value of euclidean division. Where 'num' is dividend and 'x' is divisor.  

enot [183]3 years ago
5 0

Answer:

output : 2

Explanation:

time: 0.16 exit

You might be interested in
Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.
nata0808 [166]

Answer:

4. Supervised learning.

Explanation:

Supervised and Unsupervised learning are both learning approaches in machine learning. In other words, they are sub-branches in machine learning.

In supervised learning, an algorithm(a function) is used to map input(s) to output(s). The aim of supervised learning is to predict output variables for given input data using a mapping function. When an input is given, predictions can be made to get the output.

Unsupervised learning on the other hand is suitable when no output variables are needed. The only data needed are the inputs. In this type of learning, the system just keeps learning more about the inputs.

Special applications of supervised learning are in image recognition, speech recognition, financial analysis, neural networking, forecasting and a whole lot more.

Application of unsupervised learning is in pre-processing of data during exploratory analysis.

<em>Hope this helps!</em>

8 0
3 years ago
Write a function that receives a StaticArray where the elements are already in sorted order, and returns a new StaticArray with
Allisa [31]

The code that remove duplicate is as follows:

def remove_duplicate(mylist):

    mylist = list(dict.fromkeys(mylist))

    return mylist

print(remove_duplicate([1, 1, 2, 3, 3, 5, 6, 7]))

<h3>Code explanation</h3>

The code is written in python.

  • we defined a function named "remove_duplicate" and it accept the parameter "mylist".
  • The variable "mylist" is used to store the new value after the duplicate vallues has been removed.
  • Then, wed returned mylist.
  • Finally, we call the function with the print statement . The function takes the required parameter.

learn more on python here: brainly.com/question/21126936

7 0
2 years ago
Write a program to print grade according to percentage which is entered by the user at run time.​
Alekssandra [29.7K]

Explanation:

pseudo code

var A=90%

var B=80%

var C=70%

var F=60%

var input=input

if(input>=A){

console.log(" A")

}

if(input>=B){

console.log(" B")

}

if(input>=C){

console.log(" C")

}

if(input>=F){

console.log("F")

}

7 0
3 years ago
In which phase of the software development life cycle is software tested in the same environment where it be used?
Keith_Richards [23]

Answer:

uhuuwuw

i

Explanation:

uuuuvgfbjfyrtrufuuuhuyh

4 0
3 years ago
What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?
bija089 [108]

Answer:

extranet

Explanation:

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

3 0
3 years ago
Other questions:
  • The Internet has made it possible for most people to order all of their clothing online. While this may be a preference for some
    5·1 answer
  • Shawn wants to work on a presentation. He pushes the power buttons for the computer and the monitor, but the computer fails to s
    10·1 answer
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • How to move files and folders from desktop in w10?
    13·1 answer
  • The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
    5·1 answer
  • What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets
    13·1 answer
  • Project 15A - Math Application
    10·1 answer
  • Josh needs to write a research report for his Civics class. Which file type will allow him to save his file? (5 points)
    12·1 answer
  • What does a computer use long-term memory, or ROM, for?
    13·1 answer
  • In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____. G
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!