1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
12

(in PYTHON) Write a function in REPL.it that uses three parameters, and squares the first, calculates mod 5 of the second parame

ter, and quadruples the third parameter. The function should be called, and that value stored in a variable, and then outputted using the print( ) function.
Computers and Technology
1 answer:
tatiyna3 years ago
4 0

Answer:

I wrote this myself, it should be working. I think this is what the instructions were looking for.

The code below should return

Squared: 1296  

Mod: 0        

Quadrupled: 16

Explanation:

def threeParams(squared, mod, quadruples):

   array = [squared, mod, quadruples]

   array[0] = squared ** 2

   array[1] = mod % 5

   array[2] = quadruples * 4

   return array

valueArr = threeParams(36, 15, 4)

print(f"Squared: {valueArr[0]}\nMod: {valueArr[1]}\nQuadrupled: {valueArr[2]}")

You might be interested in
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Why would you not restore a Domain Controller that was last backed up twelve months ago
Angelina_Jolie [31]

Answer:

All the data and information that was updated or added since then will be lost so it is useless to restore a Domain Controller that was backedup twelve months ago.

Explanation:

A domain conttoller back-up must be prepared on regular basis else if DC breaks, restoration of most recent database will be impossible.

7 0
3 years ago
Label provides the code that executes if no case label is matched ​
Ratling [72]

Answer:

In c/c++ it is <em>default</em>

7 0
3 years ago
You work for a company that hired a pen testing firm to test the network. For the test, you gave them details on operating syste
Bingel [31]

Answer:

White box testing strategy

Explanation:

Pen or penetration testing, also known as ethical hacking is a technique used by an organisation to examine the computer systems, networks and web applications for security vulnerabilities such as loopholes, that can be exploited by an attacker.

There several strategies in pen testing that can be used to check for network vulnerabilities, they are, internal testing, external testing, black box testing, white box testing, blind testing etc.

Unlike in black box testing, white box testing provides all necessary information like IP addresses, network structure, operating system etc, to the pen tester.

4 0
3 years ago
How long will 13 gb take to download if it is going 400kb/s
VikaD [51]
Approximately 10-20 Minutes
8 0
4 years ago
Other questions:
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of
    8·2 answers
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • Say you are running a program along with many other programs in a modern computer. For some reason, your program runs into a dea
    7·1 answer
  • What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
    13·1 answer
  • You are the administrator for a small company. You need to create a new group for users in the sales department. You need to nam
    14·1 answer
  • The difference between a checked and an unchecked exception is:
    10·1 answer
  • What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
    8·1 answer
  • Re:
    15·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!