1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
9

Can someone help me plz

Computers and Technology
1 answer:
8090 [49]3 years ago
3 0
B = x is equal to 5
and
C = “ have special meaning and should not be used when naming variables “.
You might be interested in
50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
monitta

Answer:

I can't see the image

Explanation:

please put image up there

6 0
3 years ago
Read 2 more answers
The operating system is not responsible for allowing one computer to share information with other computers.
kompoz [17]

The network layer is responsible for logical connection setup, data forwarding, routing & delivery. This therefore means that the network (third) layer of the OSI model is responsible for allowing one computer to share information with other computers.

3 0
3 years ago
Read 2 more answers
Q1). Write a python program to pass a list to a function and double the odd values and half even values of a list and display li
zepelin [54]

Answer:

\textsf{\large{\underline{Solution}:}}

The given problem is solved using language - Python.

def f(x):

   new_list=[]

   for i in x:

       if i%2==0:

           new_list.append(i//2)

       else:

           new_list.append(i*2)

   return new_list

   

my_list=list(range(1,6))

print('Original List:',my_list)

my_list=f(my_list)

print('Modified List:',my_list)

\textsf{\large{\underline{Logic}:}}

  1. Create a new list.
  2. Iterate over the list passed into the function.
  3. Check if the element is even or not. If true, append half the value of element in the list.
  4. If false, append twice the value of the element in the list.
  5. At last, return the new list.

There is another way of doing this - By using map() function.

—————————————————————————————

def f(x):

   return list(map(lambda x:x//2 if x%2==0 else 2*x,x))

   

my_list=list(range(1,6))

print('Original List:',my_list)

my_list=f(2my_list)

print('Modified List:',my_list)

—————————————————————————————

\textsf{\large{\underline{O{u}tput}:}}

Original List: [1, 2, 3, 4, 5]

Modified List: [2, 1, 6, 2, 10]

8 0
3 years ago
Overloaded methods must be differentiated by: Select one: a. method name b. data type of arguments c. method signature d. None o
Zarrin [17]

Answer:

b. data type of arguments

Explanation:

One of the ways to overload a method is using different type of arguments. Let's say we have a method that finds and returns two integer values

public int sumValues(int num1, int num2){

       return num1 + num2;

}

We can overload this method by passing double values as arguments

public double sumValues(double num1, double num2){

       return num1 + num2;

}

5 0
3 years ago
Which tectonic plate setting is associated with the following features: great earthquakes; explosive volcanic eruptions; oceanic
yarga [219]

Answer:

Convergent Plate Boundary (subduction zone)

Explanation:

A convergent plate boundary is a location where two tectonic plates are moving toward each other, often causing one plate to slide below the other (in a process known as subduction). The collision of tectonic plates can result in earthquakes, volcanoes, the formation of mountains, and other geological events. An example is the one the formed Andes Mountain.

Cheers

8 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • Which of the following topics should you avoid bringing up during a college interview?
    10·2 answers
  • Explain the history of computing of mechanical era
    14·2 answers
  • The application layer process that sends mail uses __________. When a client sends email, the client process connects with a ser
    10·1 answer
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • What are the pasting options in Outlook 2016? Check all that apply.
    10·2 answers
  • What statement best describes operating systems?
    12·1 answer
  • I need help also this counts as my second giveaway and last for today
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!