1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
11

Edhesive 7.6 lesson practice python

Computers and Technology
1 answer:
spayn [35]3 years ago
6 0

Answer:

(a) The output is -1

(b) The output is 32

Explanation:

Given: The above code

Solving (a): The output when 1, 1 and 1 is passed to the function

From the question, we have: print(mystery(x))

This means that only the value of x (which in this case is 1) will be passed to the mystery function

(a, b = 8, c = -6) will then be seen as: (a = 1, b = 8, c = -6)

2 * b + a + 3 * c = 2 * 8 + 1 + 3 * -6

2 * b + a + 3 * c = -1

<em>The output is -1</em>

Solving (b): The output when 8, 6 and 4 is passed to the function

From the question, we have: print(mystery(x,y,z))

This means that values passed to the function are: x = 8, y = 6 and z = 4

(a, b = 8, c = -6) will then be seen as: (a = 8, b = 6, c = 4)

2 * b + a + 3 * c = 2 * 6 + 8 + 3 * 4

2 * b + a + 3 * c = 32

<em>The output is 32</em>

You might be interested in
The music is the soul who says this
Crazy boy [7]

Question:the music is the soul who says this

Answer: Arthur Schopenhauer

Explanation: he says music is the language of feeling and of passion

question answered by

(jacemorris04)

4 0
3 years ago
What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?
anyanavicka [17]

Answer

The senders PC is using UDP protocol

Explanation

UDP is the User Datagram Protocol which is used as an alternative communication protocol to the TCP which is used primarily for establishing low latency and loss of tolerating connections between applications on the internet UDP is normally used by the programs running on different computers on a network. Its purposes is to send short messages which are datagrams. It is not much reliable because of its occasional loss of packet. Due to this packet loss  the recipient is not guaranteed that the data being streamed will not get interrupted. This is because If a router on the Internet starts getting overloaded, or a packet gets corrupted due to interference or anything, the packet will be dropped unlike the TCP (Transmission control  protocol)which resend the packets and keeps re sending. The UDP does not resend the packets which are dropped. Once they are dropped that all.


3 0
3 years ago
Given the following table of students, assignments, and grades for a single class:
PilotLPTM [1.2K]

Answer:

i need more

Explanation:

i need more

7 0
3 years ago
Senioritis usually affects which of the following groups the most?
Dovator [93]
Generally we'd need "the following" if the question asks about it. Senioritis usually affects high school seniors IIRC.
6 0
3 years ago
1. How does the computer take data and information ?​
aniked [119]

Answer:

Data processing, Manipulation of data by a computer. It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output. Any use of computers to perform defined operations on data can be included under data processing.  Input devices accept data in a form that the computer can use; they then send the data to the processing unit. The processor, more formally known as the central processing unit (CPU), has the electronic circuitry that manipulates input data into the information people want.

Explanation:

6 0
3 years ago
Other questions:
  • The _____ element, a hypertext markup language (html) metadata element, contains a collection of metadata elements that describe
    11·2 answers
  • Plz help ( which is an example of a good URL?
    10·2 answers
  • Proszę daje wszystko potrzebuje tego
    8·2 answers
  • Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
    12·1 answer
  • hello my friend is doing a give away at 100 followers would you follow him for a chance to win 2000 vbucks his name is ZoVa_Velo
    15·2 answers
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • A. Convert decimal 37 to binary
    13·1 answer
  • Which tools is used to bundle cables neatly inside and outside of a computer?​
    15·1 answer
  • Tiền tệ ra đời là kết quả
    7·2 answers
  • Which type of software is created on user dimension​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!