1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
12

list = 7 # these many modified Fibonacci numbers. def fibonacci_gt(n, t1, t2): if n<0: print("Incorrect input") elif n == 0:

return t1 elif n == 1: return t2 else: return fibonacci_gt(n-1,t1,t2)**2 + fibonacci_gt(n-2,t1,t2) def generate_numbers(a, b): numbers = [] for i in range(list): numbers.append(fibonacci_gt(i,a,b)) numbers = round(numbers, 3) return numbers generate_numbers(0, 1)What is the output?
Computers and Technology
1 answer:
Aloiza [94]3 years ago
5 0

Answer:

Being Python code the output will be an exception.

Explanation:

The function body of <em>generate_numbers</em> is calling the BIF <em>round</em>, which expects at least one argument of a numeric type, the first is the number to be round, and the second optional one is the precision after the decimal point. The call to <em>round</em> in <em>generate_numbers</em>,<em> </em>the first argument is a list, throwing a TypeError exception.

You might be interested in
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
2 years ago
Cari brought 2 pounds of grapes at the grocery store she ate 5 ounces of the grapes on way home what is the weight of the grapes
sveta [45]

Answer:

27 ounces

Explanation:

You can convert 2 pounds into 32 ounces then subtract the 5 ounces that she ate from that 32.

7 0
2 years ago
Which group on the home tab contains the line spacing attribute?
Juli2301 [7.4K]

Answer:

The Paragraph group on the Home tab contains commands to set and control several format options for a paragraph. The options include alignment, indentation, line spacing, and pagination. click Ctrl+J to justify. You can indent individual paragraphs so they appear to have different margins from the rest of a document.

Explanation:

comment an let me know how it helps

8 0
2 years ago
Which of the following is not hardware? Question 7 options: A) Wireless network router B) Printer C) Virus Scanner D) Flat-panel
jok3333 [9.3K]

the answer is virus scanner which is not hardware but software because if you didn't know hardware is stuff like a monitor a mouse a battery a case that's all stuff you can generally touch even the hardware inside the computer you can touch where as virus scanner you can not touch because its software again my point being its software NOT hardware

8 0
2 years ago
How did domestication of maize make the city of tenochtitlan possible?
umka21 [38]

The farming of maize began in Mesoamerica in 6000 B.C. The domestication of maize made the city of Tenochtitlan possible by providing the Aztecs the ability to feed millions. Unlike the corn that is known today, the early maize had tiny cobs but dramatically became bigger and more nutritious as time passed.


3 0
3 years ago
Read 2 more answers
Other questions:
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • What is a taskbar?
    5·1 answer
  • How do keystroke dynamics determine whether to authenticate an individual or not?
    14·1 answer
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • The command button to protect a document is part of the​.
    10·1 answer
  • Q. Which protocol would best serve to authorize users to access directory services?
    8·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    8·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
  • THis took FOREVER! please go check it out, if you have seen my demo to this game, you will like the full version! https://scratc
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!