Answer:
Explanation:
The following is written in Python. It takes in a file, it then reads all of the elements in the file and adds them to a list called myList. Then it sorts the list and uses the elements in that list to calculate the median. Once the median is calculated it returns it to the user. The code has been tested and the output can be seen in the image below.
def find_median(file):
file = open(file, 'r')
mylist = []
for number in file:
mylist.append(int(number))
numOfElements = len(mylist)
mylist.sort()
print(mylist)
if numOfElements % 2 == 0:
m1 = numOfElements / 2
m2 = (numOfElements / 2) + 1
m1 = int(m1) - 1
m2 = int(m2) - 1
median = (mylist[m1] + mylist[m2]) / 2
else:
m = (numOfElements + 1) / 2
m = int(m) - 1
median = mylist[m]
return median
print("Median: " + str(find_median('file1.txt')))
Answer:
Arduino
Explanation:
<em>Arduino is a free and open-source electronics platform with simple hardware and software. Arduino boards can read inputs, turn on a sensor and transform it into an output, activate a motor, and turn on an LED. Sara may direct her board by sending a series of instructions to the board's microcontroller. To accomplish so, she used the Arduino programming language and the Arduino Software (IDE), both of which are founded on Processing.</em>
Answer:
fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text
Explanation:
mark me a brainlist
example, the Speedometer of a car measures the speed, changes in temperature in the body with a thermometer’s help, and weighs our body with a weighing machine.
Answer: Threat
Explanation:
Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.
Threat is alter any type of data in an organization without the permission of the owner.
The threat can be classified into the different types are as follows:
- Computer worm
- DOS attack
- Rootkit
- Computer viruses