1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
9

Let A be a 2D list in Python containing randomly assigned values where its size is also randomly generated up to 10 rows and 10

columns. Let B be another 2D list in Python containing randomly assigned values where its size is also randomly generated up to 10 rows and 10 columns. Write a Python3 program to check if we can multiply these two lists as matrices

Computers and Technology
1 answer:
lana [24]3 years ago
6 0

Answer:

Rows and cols of matrix1 : 5 6

Rows and cols of matrix1 : 4 4

We can't multiply these two as matrices.

Rows and cols of matrix1 : 3 8

Rows and cols of matrix1 : 8 6

We can multiply these two as matrices.

Explanation:

Note: Check attachment for the code. Also note that "page (1/3), page (2/3) and page (3/3)" are not part of the code, it is only for numbering the  pages.

So, the aim in this question is to check if we can multiply the two lists given above as matrices. So, check below for what we are are going to input as the Python3 program which is in the attached file.

Therefore, when we write the Python3 program  and run it we are going to get an output which will read as the following;

Rows and cols of matrix1 : 5 6

Rows and cols of matrix1 : 4 4

We can't multiply these two as matrices.

Rows and cols of matrix1 : 3 8

Rows and cols of matrix1 : 8 6

You might be interested in
Why it is so important for all application builders to always check data received from unknown sources, such as web applications
Aleks04 [339]
The already-long problem on hacking and other security-related cases necessitates for the application builders to check the data received from unknown sources. To further strengthen the security, even data received from known sources also need to be check as these may also contain harmful viruses creating critical problem to the application. 
6 0
3 years ago
Within an event-driven program a component from which an event is generated is the ____
mojhsa [17]
The answer is: <span>Source of the Event</span>
7 0
3 years ago
Recall the insertion-sort-like algorithm in Problem 4 from Homework 2, where you know that certain pairs of contiguous items in
amid [387]

Answer:

See the attached picture.

Explanation:

See the attached picture.

7 0
3 years ago
Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
Alex787 [66]

Answer:

The green-blue circuit board you can see in the first photo includes the disk controller, a circuit that allows the computer to operate the drive's mechanisms and read/write data to and from it. ... A small hard drive typically has only one platter, but each side of it has a magnetic coating

Explanation:

8 0
2 years ago
JAVA
butalik [34]

Answer:

import java.util.*;

public class MyClass {

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       System.out.print("Input a word: ");

       String userinput = input.nextLine();

       for(int i =0;i<userinput.length();i+=2) {

           System.out.print(userinput.charAt(i));

       }

   }

}

Explanation:

This line prompts user for input

       System.out.print("Input a word: ");

This declares a string variable named userinput and also gets input from the user

       String userinput = input.nextLine();

The following iterates through every other character of userinput from the first using iteration variable i and i is incremented by 2

       for(int i =0;i<userinput.length();i+=2) {

This prints characters at i-th position

           System.out.print(userinput.charAt(i));

5 0
2 years ago
Other questions:
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • Match each invention with its effects on the age of exploration.
    6·2 answers
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title ba
    8·2 answers
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n)
    11·1 answer
  • Explain approaches of AI​
    12·2 answers
  • Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!