1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
13

Write a program to draw a text-based graph of a mathematical function f(x)

Computers and Technology
1 answer:
Makovka662 [10]3 years ago
4 0
I have a very good example of the program you need written on Python. You can use this (sorry for bad tabulation):
import math import math def main(): function = input("Enter a function f(x):\n") x = 0 y = 0 for rows in range(10,-11,-1): for col in range(-10,11,1): x=col roundfx = round(eval(function)) if roundfx == rows: print("o", end="") if rows==0 and col==0 and not rows == roundfx: print("+", end="") if col == 0 and not rows == 0 and not rows == roundfx: print("|", end="") if rows==0 and not col==0 and not rows == roundfx: print("-", end="") else: if not rows == 0: if not col == 0: if not rows == roundfx: print(" ", end="") print() main()
You might be interested in
Find the inverse function of f(x)= 1+squareroot of 1+2x
Svetllana [295]

Answer:

Therefore the inverse function of  f(x)=1+\sqrt{1+2x} is \frac{x^2-2x}{2}

Explanation:

We need to find the inverse of function f(x)=1+\sqrt{1+2x}

Function Inverse definition :

\mathrm{If\:a\:function\:f\left(x\right)\:is\:mapping\:x\:to\:y,\:then\:the\:inverse\:functionof\:f\left(x\right)\:maps\:y\:back\:to\:x.}

y=1+\sqrt{1+2x}\mathrm{Interchange\:the\:variables}\:x\:\mathrm{and}\:y

x=1+\sqrt{1+2y}

\mathrm{Solve}\:x=1+\sqrt{1+2y}\:\mathrm{for}\:y

\mathrm{Subtract\:}1\mathrm{\:from\:both\:sides}

1+\sqrt{1+2y}-1=x-1

Simplify

\sqrt{1+2y}=x-1

\mathrm{Square\:both\:sides}

\left(\sqrt{1+2y}\right)^2=\left(x-1\right)^2

\mathrm{Expand\:}\left(\sqrt{1+2y}\right)^2:\quad 1+2y

\mathrm{Expand\:}\left(x-1\right)^2:\quad x^2-2x+1

1+2y=x^2-2x+1

\mathrm{Subtract\:}1\mathrm{\:from\:both\:sides}

1+2y-1=x^2-2x+1-1

\mathrm{Simplify}

2y=x^2-2x

\mathrm{Divide\:both\:sides\:by\:}2

\frac{2y}{2}=\frac{x^2}{2}-\frac{2x}{2}

\mathrm{Simplify}

y=\frac{x^2-2x}{2}

Therefore the inverse function of f(x)=1+\sqrt{1+2x} is \frac{x^2-2x}{2}

4 0
3 years ago
The superclass Calculator contains: a protected double instance variable, accumulator, that contains the current value of the ca
yawa3891 [41]

Answer:

The following program are written in JAVA Programming Language.

//inherit the Calculator class

public class CalculatorWithMemory extends Calculator {  

   private double memory = 0.0;    //initialize double type variable

   public void save() {   //define function

       memory = accumulator;    

   }

   public void recall() {   //define function

       accumulator = memory;

   }

   public void clearMemory() {   //define function

       memory = 0;     //initialize the value

   }

   public double getMemory() {  

       return memory;    // return the value in "memory" variable

   }

}

Explanation:

Here, we inherit the property of the "Calculator" class.

Then, we define the private double type variable "memory" and assign value 0.0.

Then we set the function "save()" inside it we assign the value of "memory" in "accumulator" and close the function.

Then, we define the function "recall()" inside it we assign the value of "accumulator" in "memory" and close the function.

Then we set the function "clearMemory()" inside it we assign "memory" to 0.

After all, we set the double type function "getMemory()" inside we return the value of the "memory".

7 0
4 years ago
What kind of memory modules include registers between the system’s memory controller and the module’s memory chips, registers th
Nookie1986 [14]

Answer: Buffered

Explanation: Buffered memory is the memory contains registers between the modules of dynamic random access memory(DRAM).It is also known as registered memory. The purpose of using buffered memory to increase the stability and decrease the electrical load.

Other options are incorrect because ECC(error correcting code)memory is for correction and detection of incorrect data, non- parity memory is that don't utilize ECC module and multi-channel used for the increment in the rate of transmission between memory controller and DRAM.

Thus,the correct option is option buffered memory because of serial communication pattern with memory controller and parallel communication technique with chips .

4 0
3 years ago
Read 2 more answers
Who loves you tube , anyone?
kodGreya [7K]

I LIKE IT DO YOU ALSO LOVE IIT

8 0
3 years ago
Read 2 more answers
Outline the steps necessary to prepare a storage device for storing files. Identify and briefly describe the tools used to prepa
Fantom [35]

Answer:

Outline the steps necessary to prepare a storage device for storing files.

  1. Link the storage unit to a network, whether it be a laptop computer or a mobile device.
  2. Firewall it with sufficient anti-virus so that it also does not affect the linked system.
  3. The program must auto-install the storage device on the network after quarantine, and authorize it.
  4. Test the file that requires to be moved to the storage device, then upload it to the storage device after anti virus is safe.
  5. Should not directly pull the storage device out of the network, select the exit device option correctly and only then remove the device after it has been accepted.

Identify and briefly describe the tools used to prepare a storage device for storing files.

<em>EFSDump -</em> Users can share encrypted files by carrying certificates by using EFSDump. It is usually very time consuming to audit the users who have privileges. But it is very simple to list users who have access to encrypted files using EFSDump.

<em>SDelete -</em> Suppose Windows operating system eliminates the index and prevents access when we delete a file. All the same, attackers can still recover the contents of the file. Files that are encrypted by EFS leave the file behind on the disk. Using the SDelete tool we can modify free space to prevent the recovery of deleted files.

Explain why file systems are critical components of an operating system. What is their purpose?

Hypothetically defining file system is nothing more than the way files are called and logically organized for storage.

Ex: DOS, Windows, and Unix-based operating systems all contain various file systems where data is organized in tree structure.

Usually defines the naming of files, how long the suffix can be. The file system often includes a format indicating the access to a file.

Specify the file system or file systems that would be available with that operating system.

A file system controls the mechanism by which data is stored and accessed on a disk. This deals mainly with internal disk operations such as naming files, records, directories, documentation, storage management, and other protocol accesses.

  1. FAT (File Allocation Table)
  2. NTFS (New Technology File System)

Describe from an administrator perspective what is necessary to prepare a storage device for access by a user.

Connection to the storage unit is equipment-oriented. The Windows Explorer summary contains optical drives, USB keys and hard drives as separate devices, making it much easier to navigate a new computer.

To connect a Linux computer you must mount the drive by connecting it to a directory.

Usually mounting a device is a manual operation, since only the administrator determines which directory the system attaches to.

Graphical interfaces are seldom seen on Linux servers. When you plug a storage device into a USB port on your computer, nothing can happen.

Usually the mount command looks like mount/dev / sdb1/mnt, where /dev / sdb1 is the system and /mnt is the directory you want to mount it.

List a few ways that a user can utilize a file system.

System output can be improved not only by choosing the most appropriate file system(s) but also by using the various choices available for most file systems.

There are variations in the number of options depending on the specific file system, and some options can only be set at the time of development of the filesystem, even though it can be modified afterwards.

7 0
3 years ago
Other questions:
  • Web storage stores data in the browser in
    5·1 answer
  • What is the meaning for science?
    14·1 answer
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • How to cancel branly subscription??​
    8·1 answer
  • HELP PLZZZZZZZZ!!!!!!!!!!!
    14·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bx%7D%7B1%20%2B%20x%7D%20%20%2B%20%20%5Cfrac%7Bx%20%2B%201%7D%7Bx%7D%20%20%3D%20%2
    15·2 answers
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • Hey everyone. I am so bored
    14·2 answers
  • Noah is creating a startup. He uses the website Upwork to hire freelancers in India and in the Ukraine to work for him. This is
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!