1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
3 years ago
5

This is using python.

Computers and Technology
2 answers:
Wittaler [7]3 years ago
8 0

Answer:

discriminant = b * b - 4 * a * c

discriminant = b ** 2 - 4 * a * c

Explanation:

The operands are correct and in the right order (for python).

** is the operand for squaring something.

* is the operand for multiplying something.

- is the operand for subtracting something.

svp [43]3 years ago
8 0

Let's take a look at these examples individually.

discriminant = bb - 4ac. You have to use the * sign so the computer understands that you're trying to multiply two objects together.

discriminant = b * b - 4 * a * c. This example works because it's using the * where it's appropriate.

discriminant = b ^ 2 - 4ac. In python we don't use the ^ sign. To use exponents, we use **. Also, there is no * sign in between 4, a, and c.

discriminant =  b ** 2 - 4 * a * c. This example works because it uses the ** and * sign where appropriate.

discriminant = b ^ 2 - 4 * a * c. This example uses the ^ sign and python does not support it.

You might be interested in
Which item best describes fiber optic transmission?
sveticcg [70]

Answer:

a

Explanation:

analog signal sent through tiny glass strands

6 0
3 years ago
Unwanted or unneeded software included by manufacturers on new computers is called
Travka [436]
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
5 0
3 years ago
What is the best Describe an integer data type
kolbaska11 [484]

Answer:

It is a data type that only holds whole numbers, a.k.a. integers.

what is the picture about?

3 0
3 years ago
ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY
suter [353]

Answer:

B.

Explanation:

8 0
2 years ago
Read 2 more answers
Java what are synchronized functions.
adelina 88 [10]

<h2>answer:</h2>

Synchronized method is used to lock an object for any shared resource. When a thread invokes a synchronized method, it automatically acquires the lock for that object and releases it when the thread completes its task.','.

4 0
3 years ago
Other questions:
  • You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi
    7·1 answer
  • What is the output of the following program?
    9·1 answer
  • Plato Web Tech B Semester Test- I'll mark brainiest for answers to ALL
    9·1 answer
  • Anybody know this question??
    8·1 answer
  • Is it safe to turn on a computer without ram?
    5·2 answers
  • I'm trying to export a video with HitFilm Express, I am either unable to click the export button or it gets to 43% and just stop
    5·1 answer
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • *
    6·1 answer
  • The most common types of effects include entrances and exits
    11·1 answer
  • Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!