1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
9

Finish the code to search for a 7 in the array.

Computers and Technology
1 answer:
guapka [62]3 years ago
8 0

Answer:

The complete code is as follows:

from array import *

myArr = array('f',[3, 5, 7,3, 10])

location = myArr.index(7)

print(str("7")+" is at position "+str(location+1))

Explanation:

I made corrections to the third line of the code and I added a line

This line gets the index of 7 from the array myArr using the index keyword

location = myArr.index(7)

This line prints the position of the 7 in the array

print(str("7")+" is at position "+str(location+1))

You might be interested in
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
What is a spec sheet?
Artist 52 [7]
spec sheet is a document that summarizes the performance and other technical characteristics of a product, machine or component.
8 0
3 years ago
What modifier should you use on the members of a class so that they are not accessible to another class in a different package,
vova2212 [387]

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

<h3>What are public and private modifiers?</h3>

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

brainly.com/question/15108837

#SPJ1

5 0
2 years ago
Because of the relative ease of developing new operating systems, a company with significant market power, such as Microsoft, ma
Snezhnost [94]

Answer: this is an example of a contestable market

Explanation: The theory of contestable markets is associated with the American economist William Baumol. In essence, a contestable market is one with zero entry and exit costs. This means there are no barriers to entry and no barriers to exit, such as sunk costs and contractual agreements.  In this case due the competition Microsoft may charge less for    their product so the barrier's trend is to go down.

3 0
3 years ago
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good e
grigory [225]

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

8 0
3 years ago
Other questions:
  • You want to deploy software using group policy. what is necessary before deciding to assign the software to your user accounts?
    11·1 answer
  • Use blank to prevent friends who have been drinking from driving
    14·2 answers
  • When there are items that are out of the control of the programmer that may support or oppose the program goals, this is termed
    15·1 answer
  • A powerpoint ________ is a set of unified design elements.
    5·1 answer
  • Which of the following hacker attacks against wireless networks are virtually undetectable?
    12·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
    13·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • Describe how learning can be accessed in your class?​
    14·1 answer
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!