1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
6

The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec

eding numbers. The first several numbers in the sequence are: 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, etc. Write a function named fib that takes a positive integer parameter and returns the number at that position of the Fibonacci sequence. For example fib(1)
Computers and Technology
1 answer:
vlabodo [156]3 years ago
7 0

Answer:

In Python:

def fib(nterms):

   n1, n2 = 1, 1

   count = 0

   while count < nterms:

       term = n1

       nth = n1 + n2

       n1 = n2

       n2 = nth

       count += 1

   return term

Explanation:

This line defines the function

def fib(nterms):

This line initializes the first and second terms to 1

   n1, n2 = 1, 1

This line initializes the Fibonacci count to 0

   count = 0

The following while loops gets the number at the position of nterms

<em>   while count < nterms: </em>

<em>        term = n1 </em>

<em>        nth = n1 + n2 </em>

<em>        n1 = n2 </em>

<em>        n2 = nth </em>

<em>        count += 1 </em>

This returns the Fibonnaci term

   return term

You might be interested in
What are the real-life applications of coding?
oksian1 [2.3K]

Some example's of coding affecting real life:

  • Traffic Lights
  • Biometric Security
  • Robots used in factories. can work in extreme conditions.
  • Automatic Heater or Air Conditioner.
  • Expert Systems used in for Medical Use.
  • Smart Self Driving Cars
8 0
2 years ago
Describe two differences between landscape mode and portrait mode. Respond in 2-3 complete sentences.
Mice21 [21]

Answer:

they just are different

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Sometimes data you export from Access needs to be formatted as a text file instead of an Excel file.
g100num [7]

Answer:

b. False

Explanation:

Microsoft access is a database management application that can store data that can be queried from every other microsoft applications like Word, Access, Onenote etc. its attachments can be converted to best best suit the application or client that needs the file or data.

Accesss database sheets are very to Excel worksheets or books. Tabular data, Graphs and most (if not all) data format can be linked, imported or queried between Access and Excel application. Formatting files (example csv files) to text are not necessary or encouraged when exporting files.

8 0
3 years ago
What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly
IRINA_888 [86]

Answer:

D,A,B hope this is it!!!!!

7 0
3 years ago
Read 2 more answers
Other questions:
  • Assuming arrayName is the name of an array and identifier is a name of a variable that has the same data type as the array eleme
    6·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • ______________ is only one of the marketing mix tools that acompany uses to achieve its marketing objectives.
    7·1 answer
  • What does TIA stand for?
    7·2 answers
  • Which of the following best describes a group?
    13·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • Explain the difference between social engineering and reverse social engineering.
    6·1 answer
  • What is ABC computer?​
    14·1 answer
  • ________ was one of the first uses of the Internet
    15·2 answers
  • What's the maximum number of ad extensions that can show for a particular query or device at any given time?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!