1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
4 years ago
7

Write a Python function called simulate_observations. It should take no arguments, and it should return an array of 7 numbers. E

ach of the numbers should be the modified roll from one simulation. Then, call your function once to compute an array of 7 simulated modified rolls. Name that array observations.
Computers and Technology
1 answer:
Bas_tet [7]4 years ago
6 0

Answer:

import random

def simulate_observations():

   #this generates an array of 7 numbers

   #between 0 and 99 and returns the array

   observations = random.sample(range(0, 100), 7)

   return observations

#here,we call the function created above and print it

test_array = simulate_observations()

print(str(test_array))

You might be interested in
Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
Archy [21]

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

5 0
1 year ago
A network interface port has collision detection and carrier sensing enabled on a shared twisted-pair network. From this stateme
hram777 [196]

Answer:

This is an Ethernet port operating at half duplex.

Explanation:

Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).

7 0
3 years ago
Read 2 more answers
What is one advantage of a wireless network? Wireless networks provide faster data transfer speeds than wired networks. Wireless
tiny-mole [99]
People can access the internet from many locations within the wireless area
6 0
3 years ago
Read 2 more answers
The key do you use to copy and paste?
Snowcat [4.5K]

Answer:

Copy crl c PASTE is ctrl v

3 0
2 years ago
Read 2 more answers
Which steps would you take to track accounts payables at a business? Select all that apply.
soldier1979 [14.2K]

Answer:

a,c,e and f

Explanation:

7 0
3 years ago
Other questions:
  • For each of the following six program fragments: a) Give an analysis of the running time (Big-Oh will do). b) Implement the code
    5·1 answer
  • Divide (10x^3 + 19x^2 + x - 7) by (5x + 2)​
    11·1 answer
  • ____ is an act, directed at Web sites catering to children, that requires site owners to post comprehensive privacy policies and
    5·1 answer
  • A special symbol that is used as an underlining structure to an agenda
    5·1 answer
  • What type of system security malware allows for access to a computer, program, or service without authorization?
    5·1 answer
  • What is one advantage of inserting a page number field in your document instead of inserting the actual page number?
    14·1 answer
  • Advantages and disadvantages of using the command-line interface to manage files and folders
    14·1 answer
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • Tape is magnetic tape which sound ca be recorded , true or false?
    9·1 answer
  • What type of email communication reaches out to former clients and older prospects and encourages a reply? Strategic email Onboa
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!