1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
15

The counter in a for or while loop can have an explicit increment: for i=m:k:n. This advances the counter i by increment k each

time. In this problem we will evaluate the product of the first 9 even numbers 2·4·6·...·18 in two ways: (a) Write a script file that evaluates the product of the first 9 even numbers using a for loop.(b) Evaluate the product of the first 9 even numbers using a single MATLAB command. Use the MATLAB command prod.
Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
3 0

Answer:

(b) prod(2:2:18)

Explanation:

(a) Evaluate the product of the first 9 even numbers:

answer = 1;

for even = 2:2:18

    answer = answer*even;

disp(answer)

(b) Evaluate the product of the first 9 even numbers using MATLAB prod() function

answer = prod(2:2:18)

disp(answer)

You might be interested in
Timelines show
Aloiza [94]
A. the order of events...
hope this helps!
4 0
3 years ago
Read 2 more answers
The command-line interface tells a user that it's ready to receive commands by displaying a specific set of characters called a(
Brrunno [24]

Answer:

B) prompt

Explanation:

Prompt tells a user that it's ready to receive commands by displaying a specific set of characters.

For example in <em>windows</em> it can be:

C:\Temp>, The prompt states that user is currently in <em>C </em>drive <em>Temp</em> directory.

in <em>Linux </em>based operating systems it can be:

[email protected]:~/Documents$

where it is in the format [email protected]:~directory$

5 0
3 years ago
In a four-stroke engine, the time period when both valves are slightly open is called valve
Thepotemich [5.8K]
Answer to my knowledge is d. overlap
3 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ra1l [238]
The answer is DNS Cache Poisoning

Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.

       




6 0
4 years ago
Who do you like more?
Deffense [45]

Answer:

i would do both plz dont hate meh for it...

Explanation:

they both are cool but one appears in more games and thats Freddy but golden freddy and Freddy appear in fnaf 2 so thats my opinion on them.

4 0
3 years ago
Read 2 more answers
Other questions:
  • A folder has been shared with other users and set to read-only. what does this mean for users?
    11·2 answers
  • A critical path refers to:
    15·1 answer
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • Make a java program to enter a two-digit integer and determine if both digits are prime
    6·1 answer
  • What direction would you travel to go from japan to the united states
    14·1 answer
  • Provide the definition for each of the following structures and unions:
    8·1 answer
  • Various units used to measure computer memory
    13·1 answer
  • <img src="https://tex.z-dn.net/?f=4875%20-%204859" id="TexFormula1" title="4875 - 4859" alt="4875 - 4859" align="absmiddle" clas
    5·2 answers
  • name instances in the past where social media has kept you informed about the latest news around the country​
    15·2 answers
  • Which one of the following careers is the most highly resistant to economic change?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!