1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
13

Write a python function genRandomVect that returns a random 1d numpy array of size (50,) where each element is an integer sample

d from [0, 100) and no two elements in the vector are the same.
Your code snippet should define the following variable:

Name Type Description
genRando function function that returns a numpy array of shape (50,) that
contains random elements on the interval [0, 100) and
no duplicates
Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
6 0

Answer:

import numpy as np

def genRandomVect():

   arr = np.random.choice(range(100),size=(50,),replace=False)

   return arr

 

print("Random 1D numpy array where each element is an integer sampled from: [0, 100) ")

print( genRandomVect() )

Explanation:

  • Create a function to create a numpy array with random integers in range[0,100) with no duplicates
  • Use the random.choice to select random values from range[0,100)  and size attribute to take the size of the required array .
  • Finally return the numpy array.

You might be interested in
Which turn best describe news one is connected to the government and is used as a political tool more than as a business product
timurjin [86]

to be honest i dont really know, sorry

4 0
3 years ago
Your new client's AdWords account has one campaign with one ad group that contains a list of hundreds of keywords. Which best pr
Degger [83]
<span>Create new ad groups with related keywords grouped together</span>
8 0
3 years ago
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
laila [671]

Answer:

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

Explanation:

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox

c. Test Sandbox

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.

Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.

Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.

✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others

✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.

5 0
3 years ago
According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?
aalyn [17]
A) Marian Shelby. “The Fall of Rome.” Military Forces. n.p., 11 Mar 2009. Web.
14 Oct 2012.
4 0
3 years ago
Read 2 more answers
Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
love history [14]

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

7 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Which of the following is something that scientists often seek by using computer models and simulations?
    8·2 answers
  • Describe any four rights of users of information systems.
    8·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • The moon has less mass than the earth, so what happens to objects on the moon?
    11·1 answer
  • In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.
    11·1 answer
  • Conclusion for primary memory
    15·1 answer
  • What can you think of as a box or container that holds a value and has a label?
    11·2 answers
  • How does links helped a student like you in navigating the different available websites?
    5·1 answer
  • I WILL MARK BRAINIEST FOR THIS!!!!!!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!