1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
4 years ago
10

Write a function named "sort_by_product" that takes a list/array of lists/arrays as a parameter where each of the values of inpu

t is a list containing 6 floating point numbers. Sort the input based on multiplication of the sixth and second values in each list
Computers and Technology
1 answer:
vladimir2022 [97]4 years ago
3 0

Answer:

Following are the program in the Python Programming Language:

def sort_by_product(products): #define function

   products.sort(key=lambda x: x[4] * x[1]) #solution is here

   return products  #return products

#set list type variable

product = [  

   [1, 2, 9, 1, 1, 2],

   [1, 7, 9, 9, 7, 2],

   [1, 1, 9, 5, 2, 2],

   [1, 5, 9, 4, 6, 2],

]

sort_by_product(product)  #call function

print(product)  #print result

Explanation:

Here, we define function "sort_by_product" and pass an argument inside it.

  • inside the function we sort the list and writr the following solution in it.
  • we return the value of products

Then, we set the list type variable 'product' then, call the function.

You might be interested in
Which of the following common software packages would help a business
Jobisdone [24]

Answer:

D. Spreadsheets

Explanation:

While A also seems correct, a spreadsheet is best at collecting and organizing data. Databases would only store data while a spreadsheet would keep those records, as well as help calculate a budget or payroll.

3 0
3 years ago
The Knowledge Consistency Checker (KCC) ensures the maximum number of hops between any two domain controllers does not exceed wh
Katarina [22]

Answer:

Three (3)

Explanation:

Explanation of the three basic terms here - Knowledge consistency checker, hops and domain controller - will give a clearer answer and explanation to the question as follows;

<em>Domain controller</em> : is a server controller that gives access or controls to users on computer networks by first responding to their authentication requests and verifying those users. In other words, a domain controller is a network security manager.

<em>Hop</em> : A hop is simply the passage of data packets from one network to another. As  a packet moves from its source to destination, it moves from router to router. The number of such routers that the packet passes through is called a hop.

<em>The Knowledge Consistency Checker (KCC)</em> :  It is the job of the KCC to ensure that these domain controllers participate in the replication promptly and orderly. Replication means copying data from one location to another (within a network or among networks). The KCC ensures that the maximum number of hops permitted is does not exceed 3. i.e no domain controller is more than 3 hops from any other domain controller within a network.

Note: Replication is of two types - intrasite (among all domain controllers within a site) and intersite (among all domain controllers in different sites), and the KCC can manage both type of replication. Also, by default, at every 15 minutes interval, a domain controller generates a replication topology (a logical map that dictates the domain controllers that will replicate with each other).

<em>Hope this helps!</em>

3 0
3 years ago
Observe the things at Home in which you are using binary
vazorg [7]

Explanation:

All five things i can come up with her

1. Doors (we either open or close them)

2. Tap (we either open or close the valve)

3.  Electric stove/cooker

4. The lid of containers

5. Shoes/ foot wears(we put them ON or OFF)

7 0
4 years ago
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
While a remote assistance session is in progress, what keyboard key(s) can the requestor press to terminate the connection?
o-na [289]

ESC key can the requestor press to terminate the connection.

<h3>what is the ESC key?</h3>
  • The European Society of Cardiology is a professional organization that strives to increase scientific knowledge of the heart and vascular system as well as the prevention, diagnosis, and treatment of disorders of the heart and blood vessels.

To learn more about ESC key, refer

to brainly.com/question/25689052

#SPJ4

8 0
2 years ago
Other questions:
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • What to do when the tool bar for paint tool sai dissapears?
    12·1 answer
  • Where would the information needed to start a computer be stored
    10·1 answer
  • A blank is a copy of one or more files that is made in case the original become lost or damaged
    7·1 answer
  • When computing the cost of the basket of goods and services purchased by a typical consumer, which of the following changes from
    11·1 answer
  • Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl
    11·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • What is the maximum ream size on an agile project?
    15·1 answer
  • In 1868 the qwerty keyboard was patented by this man
    5·1 answer
  • A(n) ________ will clear all user data and setting changes, returning the device's software to the state it was in when it left
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!