1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
10

On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * r^n, where n is the distance

(number of keys) from that key, and r is 2^(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies. Ex: If the input is 440 (the A key near the middle of a piano keyboard), the output is: 440.0 466.1637615180899 493.8833012561241 523.2511306011974 554.3652619537442 Note: Use one statement to compute r = 2^(1/12) using the RaiseToPower() function. Then use that r in subsequent statements that use the formula fn = f0 * r^n with n being 1, 2, 3, and finally 4.
Computers and Technology
1 answer:
vodomira [7]3 years ago
6 0

Answer:

Following are the code to this question:

import math# import math module

def RaiseToPower():   # defining a function RaiseToPower

   r= math.pow(2,1/12)    # defining r variable that calcualte the decimal point value.

   return r # return r variable value.

f0= float(input()) #defining f0 variable that hold input frequency .

for n in range(0,5):#defining for loop to count all frequency

   fn = f * math.pow(RaiseToPower(),n)    # defining fn variable that calls method RaiseToPower and multiply the value by frequency

   print(fn,end=' ')    # use print method to prints all five frequency

Output:

440

440.0 466.1637615180899 493.8833012561241 523.2511306011974 554.3652619537443

Explanation:

Description of the above python code can be defined as follows:

  • In the above code first we import the package of the math module for converting frequency, after importing package a "RaiseToPower" method is declared, inside the method r variable is declared, that counts decimal value and return its value.
  • In the next step, "f0" a frequency variable is declared that input a value from the user and defined a for loop to in the loop fn variable declared, calls the method and pass its input value and stores its decimal points and at the last print its value.

You might be interested in
What can you do to improve your own digital wellness?
julsineya [31]
Update your passwords frequently, delete unused accounts, and be diligent about who and what you give your most personal information to. Invest in tech that fits your lifestyle without offering further distractions.
4 0
3 years ago
Read 2 more answers
What source ip address does a router use by default when the traceroute command is issued?
maw [93]

When sending an echo request message, a router will use the IP address of the exit interface as the source IP address.

<h3>What is traceroute IP address?</h3>

Traceroute, also called tracepath or tracert, is a network tool used to determine the “path” packets take from one IP address to another.

It provides the hostname, IP address, and the response time to a ping. Enter the IP address that you want to lookup.

Traceroute ensures each hop on the way to a destination device drops a packet and sends back an ICMP error message.

This means traceroute can measure the duration of time between when the data is sent and when the ICMP message is received back for each hop—giving you the RTT value for each hop.

To learn more about IP address, refer

https://brainly.ph/question/4632300

#SPJ4

4 0
2 years ago
HELP PLEASE!
nasty-shy [4]

Answer:

It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.

Explanation:

3 0
3 years ago
Read 2 more answers
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
The Windows security feature called User Account Control requires you to login as a user that is a member of Server Operators be
Galina-37 [17]

Answer:

false

Explanation:

Is a good practice and recommends not to enable the built-in Administrator account on the client computer, we must use the standard user account and User Account Control (UAC).

If we want to enable the built-in Administrator, in this case, for security reasons you should also enable Admin Approval Mode.

6 0
3 years ago
Other questions:
  • A(n) _____ is a type of server that stores computer software, which users can access from their workstations.
    6·1 answer
  • Convert to binary140
    5·1 answer
  • FILL IN BLANK FOR THE POINTS!!!!!!
    8·1 answer
  • What are wizard ranks in brainly​
    13·2 answers
  • 2 examples of miniature storage media ?
    8·2 answers
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    13·1 answer
  • What is output if month = 11 and day = 14?
    13·2 answers
  • What standards organization maintains the ethernet standard?.
    12·1 answer
  • 13,Which hardware device is used in decoding the machine language version of an instruction in the Instruction Decode stage of t
    13·1 answer
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!