1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
5

Which Numpy function do you use to create an array? (Points : 1) np

Computers and Technology
1 answer:
ra1l [238]3 years ago
6 0

Answer:

The correct option is np.array

Explanation:

Numpy is a library to perform numerical calculation in python. It allows us to create and modify vectors, and make operations on them easily. Numpy arrays are an excellent alternative to python lists. Some of the key advantages of numpy arrays are that they are fast, easy to work with, and offer users the opportunity to perform calculations through full arrays.

To start using numpy, the library must be imported:

import numpy as np

The most common way to create a vector or matrix already initialized is with the np.array function, which takes a list (or list of lists) as a parameter and returns a numpy matrix. The numpy arrays are static and homogeneous typing. They are more efficient in the use of memory.

Example:

list = [25,12,15,66,12.5]

v = np.array (list)

print (v)

You might be interested in
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
On a web page coded in HTML, there is a sentence that reads, "Welcome to Assessments Section." Sam wants to insert the word "the
Natalka [10]

Answer:

The inserted text will appear as underlined text. The deleted text will appear as strike through text.

Explanation:

In HTML the text which has been inserted will appear as underlined text. It means if we insert something in HTML then it will underline it. This will highlight the text that has been inserted. While on the other hand if we delete some text and replace it with some other text, then it will appear as strikethrough text.

Strikethrough text is the text which is represented with a horizontal line in its center. It represents those words which are added by mistake and are not meant for inclusion.

7 0
4 years ago
After merging two arrays is complete you need to
VikaD [51]

Answer: C) copy the merged array back to the original array

Explanation:

 After performing merging of two array then, copy the merge array back to its original array. Merging of two array is done by the process of merge sort. Merging of two array is the similar process of concatenate the two array into the single object.

It basically works on the principle of divide and conquer algorithm. It divide the input value into the two half and then, sorted the accordingly. Then after completion of merging the two array it copy into the original array.

5 0
4 years ago
Which of the following describe the characteristics of a good logo? Choose all that apply. It is a complex design It is memorabl
nasty-shy [4]

Answer:

It is memorable.

It utilizes the elements of design.

Explanation:

IMO these 2 will determine a good logo. Since everyone should remember it if they come across it again in the future

6 0
2 years ago
"the ________ attribute of the anchor tag can cause the new web page to open in its own browser window."
zheka24 [161]
Target





-------------------------------
8 0
3 years ago
Other questions:
  • ________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
    12·1 answer
  • Which command provides the source reference on the last page of a document?
    14·2 answers
  • Which of the following statements is not true about proper tire care? a.If you see a wear bar across the width of the tread whil
    14·2 answers
  • **PLEASE HELP**
    12·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • Why would a designer choose to use a static layout? Check all of the boxes that apply.
    6·1 answer
  • How to write conclusion of hard disk​
    11·1 answer
  • You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
    11·1 answer
  • Take values of length and breadth of a rectangle from the user and check if it is square or not.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!