1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
9

Write a Python class that inputs a polynomial in standard algebraic notation and outputs the first derivative of that polynomial

. Both the inputted polynomial and its derivative should be represented as strings.
Computers and Technology
1 answer:
Ivahew [28]3 years ago
3 0

Answer:Python code: This will work for equations that have "+" symbol .If you want to change the code to work for "-" also then change the code accordingly. import re def readEquation(eq): terms = eq.s

Explanation:

You might be interested in
A ball is released from a 10 m high roof and bounces two thirds as high on each successive bounce. After traveling a total of 40
skelet666 [1.2K]

Answer:

Four times traveling 40,12345 mts

Explanation:

We can express this as a sum as follows

\sum_{i=1}^4(10\cdot  \frac{2}{3}^{i - 1} + 10\cdot  \frac{2}{3}^{i } ) = 3250/81=40.12345679

The first term is the dropping part and the second is the upward motion. this sums up to 40,12345 m after bouncing four times. As a program we could write using the while loop.

distance=0;

i:=0;

while distance<40 do

i:=i+1;

distance:=distance+ 10\cdot  \frac{2}{3}^{i - 1} + 10\cdot  \frac{2}{3}^{i };

end while;

Here the answer is in i and the closest distance traveled after reaching 40 is in the variable distance.

4 0
4 years ago
Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital color image. Plz I got
iragen [17]

Answer:

Sampling, RBG pixels and binary sequences work together to display a digital color image by letting the computer know where the RBG pixel is going to be placed and what the opacity for that pixel is. The combination of these components is what gives you a digital color image.

Explanation:

I'm not sure if this is correct because I had trouble with it too but this is what I wrote for the answer.

4 0
3 years ago
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
What is the best motivation that you can do/give to make your employees stay? ​
Lorico [155]

i'd give fringe benefits to them every month

Explanation:

to encourage them to work on the mission statement and the business goal

8 0
3 years ago
Users can customize sparklines In Excel 2016 using which items? Choose two answers Here are the possible answers: Location , sty
andriy [413]

formula and styles maybe

4 0
4 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • _____ enable patients to use the Internet to compare the quality, safety, and cost information on hospitals nationwide.
    6·1 answer
  • Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
    5·1 answer
  • What do these terms have in common? google, yahoo!, bing they are important books. they are internet search engines. they are wo
    10·1 answer
  • Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
    15·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • 4. Describe a report that a company might want to create and run on a regular basis. (1-3
    10·1 answer
  • . Write the advantages and disadvantages of CLI?
    14·2 answers
  • Write your own accessor and mutator method for the Rectangle class instance variables. You should create the following methods:
    10·1 answer
  • What was the strategy the company adopted for ERP implementation?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!