1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
10

How can you find the square root of 8 using the pow() function

Computers and Technology
1 answer:
zimovet [89]3 years ago
7 0

import math

print(math.pow(8, 0.5))

You can find the square root of any number by squaring it by 0.5

You might be interested in
What are some examples of productions categorized as non-broadcast productions?
leonid [27]

Answer:

Non-broadcast media incorporates

  • Recorded television
  • Radio
  • Podcasts
  • Internet
  • Streaming services.

Explanation:

Non-broadcast media is a phrase used to represent audio and visual communications that can be obtained at any moment. Non-broadcast media is the knowledge that can be switched on and off, suspended, rewound, and fast-forwarded at certain times.

Examples of non-broadcast productions

Non-broadcast media incorporates

  • Recorded television
  • Radio
  • Podcasts
  • Internet
  • Streaming services.

To learn more about broadcast productions refer:

  • https://brainly.in/question/17335292
  • https://brainly.in/question/44811105

4 0
3 years ago
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
The first query is computationally less expensive than the second query. (Assume no indexes exist on release_date.) Query 1: SEL
sdas [7]

Answer:

false

Explanation:

The term 'computationally expensive' means that a given mathematical function, code or an algorithm has high computational complexity. In addition, the mathematical function or algorithm will require several steps and procedures to be completed. Based on this, the statement made in this question is not true.

7 0
3 years ago
You can not give an exact size for a height for column width true or false
GalinKa [24]

Answer:

~false~

Explanation:

5 0
3 years ago
Other questions:
  • It is not recommended by the USA EPA, but adding refrigerant to a leaking A/C system is
    13·1 answer
  • Which part of the cpu stores instructions for high speed access or processing
    14·1 answer
  • When you are working on an unsaved document on a PC, where is the document temporarily saved?
    5·1 answer
  • Match the keyboard shortcuts to the function they perform
    10·1 answer
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • Which of the following statements is true of San serif fonts?
    12·2 answers
  • PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MY QUESTION WHICH IS DUE TODAY PLZ ANSWER ALL OFIT!!!!
    10·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    14·1 answer
  • Which command os used to find a particular word in a document ?<br>​
    9·2 answers
  • How do you enlarge an image to see more detail on it? (1 point)
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!