1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
15

Is_sum_odd that takes a non-negative integer number as parameter and returns true if the sum of individual digits is odd, false

otherwise.
Computers and Technology
1 answer:
lara31 [8.8K]3 years ago
6 0
Make sure that you understand how addDigits( number, base ) works!

```
#!/usr/bin/python

import sys


def addDigits( number, base ):
    if( number ):
        return( addDigits( number // base, base ) + ( number % base ) )
    else:
        return( 0 )


def wrapper( number, base=10 ):
    if( ( addDigits( number, base ) ) % 2 ):
        return True
    else:
        return False


if( __name__ == "__main__" ):
    if( len( sys.argv ) != 2 ):
        sys.stderr.write( "usage: " + sys.argv[ 0 ] + " <integer>\n" )
        exit( 127 )

    print wrapper( int( sys.argv[ 1 ] ) )
```

You might be interested in
Which statement is correct? a. choice of metric will influence the shape of the clusters b. choice of initial centroids will inf
katrin2010 [14]

Answer: the answer is c

Explanation:in general, the merges and splits in hierarchical clustering are determined in a greedy manner

8 0
3 years ago
What educational site could I make a screen capture tutorial on? I need ideas for a school project.
snow_tiger [21]

You Need Software To Screen Capture

The Software You can use is OBS its free and there are watermarks

4 0
3 years ago
Access time is:________.
worty [1.4K]

Answer:

B) the time it takes for the required sector to position itself under the read/write head.

Explanation:

In Computer science, Access time is the time it takes for the required sector to position itself under the read/write head. It is usually measured in milliseconds.

It is the speed of the storage device.

5 0
3 years ago
You are the owner of a computer component manufacturing company. Your manufacturing plant has 10 different machines that can be
Murljashka [212]

Answer:

7 raise to power 10

Explanation:

Since there are 4 possible ways to make memory chip and 3 possible ways to manufacture mother board, so for each machines we have 7 possible ways of configurations.

So total number of ways in which these machines can be configured is 7*7*7*...*7= 7raise to power 10 possible ways

7 0
3 years ago
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Other questions:
  • A _____ is an employment test that evaluates your specific job-related abilities, such as typing speed. It is recommended that y
    6·2 answers
  • What is an examlple of cyberbullying
    5·1 answer
  • Please write a code for below:
    9·1 answer
  • Query " frosty the snowman
    8·1 answer
  • What attracts attention and adds spatial depth to a two-dimensional design.
    9·1 answer
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • Write two example use of relationships ICT
    11·1 answer
  • What types of printed information are useful to obtain from your target employers?
    5·1 answer
  • What is the name for data generated by a computer using an algorithm?
    7·1 answer
  • which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!