1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
9

Let A be a 2D list in Python containing randomly assigned values where its size is also randomly generated up to 10 rows and 10

columns. Let B be another 2D list in Python containing randomly assigned values where its size is also randomly generated up to 10 rows and 10 columns. Write a Python3 program to check if we can multiply these two lists as matrices

Computers and Technology
1 answer:
lana [24]3 years ago
6 0

Answer:

Rows and cols of matrix1 : 5 6

Rows and cols of matrix1 : 4 4

We can't multiply these two as matrices.

Rows and cols of matrix1 : 3 8

Rows and cols of matrix1 : 8 6

We can multiply these two as matrices.

Explanation:

Note: Check attachment for the code. Also note that "page (1/3), page (2/3) and page (3/3)" are not part of the code, it is only for numbering the  pages.

So, the aim in this question is to check if we can multiply the two lists given above as matrices. So, check below for what we are are going to input as the Python3 program which is in the attached file.

Therefore, when we write the Python3 program  and run it we are going to get an output which will read as the following;

Rows and cols of matrix1 : 5 6

Rows and cols of matrix1 : 4 4

We can't multiply these two as matrices.

Rows and cols of matrix1 : 3 8

Rows and cols of matrix1 : 8 6

You might be interested in
What is the best software for game design
riadik2000 [5.3K]

The 2D Design Engines

10. Sploder

This program should be labeled a product for the very novice of game designers and developers. It features a very simple interface that can be used to make shooters and platformers. The custom game, which Sploder creates, always comes out as flash, which is arguably one of the best places to start anyway. It features a drag and drop interface, and your games can also be shared with other Sploder users, making it a community application.

9. RPG Maker XP

Yet another beginner program RPG Maker is well known all around the gaming community as an awesome place to start designing. It features many tropes of those old 16bit RPG games that were in the rage during the early 90’s. Along the way, the program usually holds your hand through the process of creating your world and story, which is also supplemented by countless FAQs and forums discussing the program.

8. Multimedia Fusion 2

For the fledgling designer who has more than a few games under their belt, Multimedia Fusion 2 is the next logical step in design. It contains and intricate system that details a lot of design when it comes to levels, characters, and actions. The design also allows for easy assignment of behaviors to objects, as everything can be done through dragging and a little bit of event planning. Overall, this is a powerful program that any designer should try out in the long run.

7. Construct Classic

Construct Classic shares a lot of the same tropes with easy to use designing software in that it is very easy to use. The classic version of this program boasts the ability to create Direct X titles with the addition of an awesome physics engine, even system, and fully realized pixel shader effects. The program is ideal for creating prototypes, but can also be used to make simple games.

6. Flixel

In terms of 2D game design, Flixel reigns supreme because of one very important fact. A created game with the Flixel engine can be distributed freely, with no need to purchase a license to distribute the said game. It also got one of the most supportive forums as the program is constantly updated with improved collision and even boxes, along with countless 2D objects.

The 3D Design Engines

5. UDK (Unreal Development Kit)

The Unreal Engine is an iconic design program, and there are tons of titles that prove the very same. It has been in use for so many years that no one can dispute how powerful it really is. At the same time, it’s a very good intermediate level design program, as it features a full 3D workspace where designs for levels and characters can all be made. Be forewarned though, this is a very professional program, and if you intend to create game, you’ll have to pay $100 plus royalties for each sale.

4. Blitz Max

For beginners that want to upgrade from 2D to 3D without too many hiccups, Blitz Max is the perfect tool to translate that journey. It features a very fundamental approach to 3D games design, buy at the same time, it doesn’t restrict the user in too many ways. In terms of graphical quality, don’t expect too much out of it as the aesthetics are based on the most fundamental designs.

3. Pygame

One of the reasons why Pygame is on this list is because it deals with the Python programming language. This makes it a very big contender as Python mostly belongs the PS3 format, and is a tricky language to master. However, this program, with the many countless tutorial books makes it easier to grasp every concept required in making games.

2. XNA Games Studio

XNA is the prime language you should pick if you’re really considering getting serious with games design and creation. The design program has countless different titles under its already well established repertoire, and that is still fast growing. However, you also have to be aware that the software is on the technical side of design, as you may see in games Spelunky or Magicka.

1. Unity3D

We can’t all be masters of programming languages, and certainly, not all of us have the ability to create game engines from scratch. This is basically the idea behind Unity 3D, and it upholds that same ideal very well because it takes a very hands-off approach to your design. There are many different tutorials on how you can get started on this engine, so starting now might be beneficial to you.

7 0
3 years ago
Read 2 more answers
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
Write a second convertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches. Ex:
mixer [17]

Answer:

   public static double convertToInches(double numFeet, double numInches){

       return (numFeet*12)+numInches;

   }

Explanation:

This technique of having more than one method/function having the same name but with different parameter list is called method overloading. When the method is called, the compiler differentiates between them by the supplied parameters. The complete program is given below

public class FunctionOverloadToInches {

   public static void main(String[] args) {

       double totInches = 0.0;

       totInches = convertToInches(4.0, 6.0);

       System.out.println("4.0, 6.0 yields " + totInches);

       totInches = convertToInches(5.9);

       System.out.println("5.9 yields " + totInches);

       return;

   }

   public static double convertToInches(double numFeet)

       {

           return numFeet * 12.0;

       }

       /* Your solution goes here */

   public static double convertToInches(double numFeet, double numInches){

       return (numFeet*12)+numInches;

   }

}

5 0
2 years ago
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured
natka813 [3]

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

4 0
2 years ago
Other questions:
  • If you and another person want to encrypt messages, what should you provide that person with?
    10·1 answer
  • Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
    12·1 answer
  • Convert the following four unsigned binary numbers to decimal and show your work:
    14·1 answer
  • what are the benefits of VolP? select all that apply. A:cheaper printings B:clearer calls C: faster download D: increased effici
    11·2 answers
  • Send me the answers<br>​
    15·1 answer
  • write a function that returns a list, where each member of list contains previous day’s value multiplied by 2.​
    15·1 answer
  • Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
    5·1 answer
  • Can you please look through this code and see wants wrong with it? its in python
    11·1 answer
  • 7. Explain the steps for formatting a shape ?
    5·1 answer
  • Question 1 Fill in the blank: Internet search engines are an everyday example of how Boolean operators are used. The Boolean ope
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!