1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
4 years ago
10

4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to

the power of z), the absolute value of y, and the square root of (xy to the power of z). Ex: If the input is:
Computers and Technology
1 answer:
Greeley [361]4 years ago
4 0

Answer:

The function is as follows:

import math

def func(x,y,z):

   print(math.pow(x, z))

   print(math.pow(x,math.pow(y, z)))

   print(math.fabs(y))

   print(math.sqrt(math.pow(x*y,z)))

Explanation:

This imports the math library

import math

This defines the function

def func(x,y,z):

Print the stated outputs as it is in the question

<em>    print(math.pow(x, z)) ---> x to power x</em>

<em>    print(math.pow(x,math.pow(y, z))) ---- x to power of y of z</em>

<em>    print(math.fabs(y)) ---- absolute of y</em>

<em>    print(math.sqrt(math.pow(x*y,z))) --- square root of xy power x</em>

<em />

You might be interested in
The ? Tool removes blemishes and imperfections by sampling pixels around the spot and then paints withh matching texture, transp
Nikitich [7]

the healing tool removes blemishes and imperfections by sampling pixels around the spot and then paints with matching texture, transparency, adn lighting  

8 0
4 years ago
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
Which is the best method of marketing a game to casual players?
Phoenix [80]
A casual game is a video game targeted at or used by casual gamers. Casual games may exhibit any type of gameplay or genre. They are typically distinguished by simple rules and by reduced demands on time and learned skill, in contrast to more complex hardcore games. They typically impose low production and distribution costs on the producer. Casual games are often played on a personal computer online in web browsers, but are also popular on game consoles and mobile phones.

Hope this helped. Have a great day! :D
3 0
4 years ago
Read 2 more answers
Class secretType { public: static int count; static int z; secretType(); secretType(int a); void print(); static void incrementY
ANEK [815]

Answer:

a. secretType mySecret(9)

Explanation:

6 0
3 years ago
What is the binary number system? ​
Scilla [17]
DescriptionIn mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" and "1". The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.
6 0
3 years ago
Other questions:
  • Given that a method receives three parameters a, b, c, of type double, write some code, to be included as part of the method, th
    8·1 answer
  • Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she
    10·1 answer
  • Which of the following might not exist in a URL?
    10·2 answers
  • Does inline-block means it makes the block element inline?
    15·1 answer
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • PHP can be run on Microsoft Windows IIS(Internet Information Server):
    5·1 answer
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
  • 3. Cellular phone technology works on a system of geographically separated zones
    12·1 answer
  • Can someone help me?
    14·1 answer
  • Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!