1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
14

Write a function negateOdds that takes a list of integers and returns a list of integers with all of the odd integers negated. n

egateOdds :: [Integer] -> [Integer]
example: [1,2,3,4,5] should return [-1,2,-3,4,-5]
Computers and Technology
1 answer:
aleksley [76]3 years ago
5 0

Is this computer science?

If so, then the function you would need for your code is this...

_____

if (someValue%2 != 0) {

 value *= -1;

        }

_____

//basically <u>number%2 == 0</u> means even so "!" means false so "not even" meaning "odd."

Assuming you are doing an array list (given a set value) or a for-loop with an

int someValue = Integer.parseInt(args[i]); inside (not given a set value and not restricted)

Otherwise ignore me....lol

You might be interested in
Which country has the most common features of analogue and digital computer​
ANTONII [103]

Explanation:

i don't think rhis question could be..

4 0
3 years ago
What do you need to do in order get paid for ads running on your content?
OverLord2011 [107]
If you're talking about YouTube or platforms like that, you have to monetize your videos in the settings. However, if your video contains copyrighted content, you will most likely be banned or given a strike for copyright infringement. You can monetize videos that have absolutely no copyrighted music, pictures or videos
4 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
What is computer with figure​
GenaCL600 [577]

Answer:

A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.

5 0
2 years ago
Give three reasons why it s important to ensure your portfollo is professional
FrozenT [24]

Answer:

1. Showcase your skills

Explanation:

2. Stand out from the crowd

3. Keep track of all emails, notes, and performance reviews

6 0
2 years ago
Other questions:
  • Why is audio greyed out on powerpoint ms office 2011?
    10·1 answer
  • There is a flashing yellow light at the intersection you are approaching. What does the flashing yellow light indicate, and what
    8·1 answer
  • On a vehicle with a manual transmission, a frequent mistake is shifting
    11·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • Harry is undertaking a digital photography course as the college and wants to
    12·1 answer
  • Write a program that:
    13·1 answer
  • A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has
    11·1 answer
  • You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB
    10·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!