1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
4 years ago
9

When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be

done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Ex: If the input is:

5 30 50 10 70 65
the output is:

20 40 0 60 55
The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list.
Computers and Technology
1 answer:
Savatey [412]4 years ago
3 0

Answer:

The program to this question can be defined as follows:

Program:

n = int(input("Enter the number: ")) #input value from user end  

print("Entered value: ",n) #print value

lt = [] #defining an empty list

for i in range(n): # loop to input values  

   lt.append(int(input())) #add values in the list

minimum_value = min(lt) # finding minimum value

print("Smallest value: ",minimum_value) #print value

print("Normalising data: ") #print message

for x in lt: #defining loop normalising value

   print(x-minimum_value) #print normalised values

Output:

Enter the number: 5

Entered value:  5

90

60

30

80

70

Smallest value:  30

Normalising data:  

60

30

0

50

40

Explanation:

In the given code a variable "n" is defined, that input value from the user end, in the next step, an empty list is defined, an two for loop is declared, which calculates the given value.

  • In the first for loop, the append method is used, that input values in the given list, and at the last use the min function, that prints the smallest value in the list, and stores its value in the "minimum_value".
  • In the second for loop, the "minimum_value" variable value is subtracted from the list value and print its values.  
You might be interested in
Choose the type of collection described.
Stella [2.4K]

Answer:

1) List

2) Dictionary

3) Tuple

Explanation:

A list uses square brackets. It is used to store multiple items in just one variable. They are usually changeable and give room for duplicates. You use append to add to the collection.

A dictionary uses curly brackets. You use update to add to the collection. A dictionary is created by placing the elements in curly brackets and separating them with a comma. It is changeable and it does not give room for duplicates.

A tuple uses parentheses. You cannot change it once you create it. It is an ordered list of elements that is finite and can also store multiple items in one variable.

7 0
3 years ago
The entities on which data are collected are _____.
sasho [114]

Answer:

<h2>ELEMENT</h2>

Explanation:

<h3>hope it helps you!!!</h3>
8 0
3 years ago
Why do we need multitasking functionality in an Operating System?
Leokris [45]

Answer:

Multitasking is a process in which we do multiple task at a time.    

In computing system, multitasking is the concept of performing different types of multiple task and process over a certain period of time by executing simultaneously.

Operating system basically allow various task to run simultaneously by the user. In an operating system, each task consume storage system and all the other resources.

Multitasking function facilitate memory isolation in the processor and also supported different levels of security system in the operating system. For example, "a programmer working on any program in a system and as well as listening the music then, it perform multiple task at the same time".

7 0
3 years ago
Please help...........​
MrMuchimi

Answer:

Explanation:

As a user of GPL v3 software, you have lots of freedom: You can use GPL software for commercial purposes. You can modify the software and create derivative work. You can distribute the software and any derivative work you produce, without having to ask for permission or pay

4 0
3 years ago
Read 2 more answers
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Other questions:
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • What part of the boot-up process initializes hardware and finds an operating system to load?
    14·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • The first step in the information processing cycle is _____, which involves entering data into the computer.
    8·1 answer
  • Select the correct answer.
    12·2 answers
  • Do you know how to change your grades on a printer???????????
    13·1 answer
  • What is causing the electricity prices to increase in South Africa?​
    14·1 answer
  • (b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).
    15·1 answer
  • which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!