Answer:
# Solve the quadratic equation ax**2 + bx + c = 0
# import complex math module
import cmath
a = 1
b = 5
c = 6
# calculate the discriminant
d = (b**2) - (4*a*c)
# find two solutions
sol1 = (-b-cmath.sqrt(d))/(2*a)
sol2 = (-b+cmath.sqrt(d))/(2*a)
print('The solution are {0} and {1}'.format(sol1,sol2))
Hope This Helps!!!
Answer:
It reverts to the original image
Explanation:
Answer:
a parameter is fixed over time, while an exogenous variable is allowed to change over time.
Explanation:
A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.
This value can be passed to a function either by reference or by value.
Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
A variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited. Thus, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.
An exogenous variable can be defined as a that's independent of other variables in a system i.e it's not affected by other variables.
This ultimately implies that, the difference between a parameter and an exogenous variable is that a parameter is fixed over time, while an exogenous variable is allowed to change over time and as such it has a relationship with other variables in a system.
Answer:
simultaneously might be the answer
Answer:
Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.