1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
8

Create a set of functions that compute the mean, median, and mode of a set of

Computers and Technology
2 answers:
zepelin [54]3 years ago
5 0

Refer to the attachment.

Language used=Python

Sauron [17]3 years ago
3 0

Answer:

Create a set of functions that compute the mean, median, and mode of a set of

numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers

provides a simple algorithm for calculating the median for a set of numbers. Each

Function should expect a list of numbers as an argument and return a single number

Each function should return O if the list is empty. Include a main function that tests

he three statistical functions with a given list. Do not use the statistics or math

nodules to create the functions. The functions must be created by you.

You might be interested in
You can customize backdrops in Scratch, adding text or freestyle drawings over the initial image
sveticcg [70]

Answer:

A. True

Explanation:

ive done this myself

https://scratch.mit.edu/projects/395142260/

3 0
3 years ago
What permanent magnets of a motor are replaced with more powerful ones, what effect do you think this would have on motor rotati
Marat540 [252]
When permanent magnets of a motor are replaced with more powerful ones, the motor rotation will increase. This is because there is more electricity being generated.
7 0
3 years ago
Read 2 more answers
Anna discovers malware on her computer. After being downloaded, the malware self-activated and replicated itself and infected th
Tresset [83]

Answer:

A.

Explanation:

The malware that replicates itself and can infect the entire system is a worm.

A worm is a type of malware that gets self-activated and replicated. This worm spreads rapidly over the computer system and can corrupt all the files and the entire system.

A worm is a standalone application and does not require action from humans.

Therefore, option A is correct.

6 0
3 years ago
Please help with this coding problem! Any help is greatly appreciated!!
Nonamiya [84]

The python program is an illustration of python functions; Functions are names statements that are executed when called.

<h3>The order in which the statements are executed?</h3>

The program uses functions, and the functions would be executed when called.

So, the order of the statements is:

  • Line 10
  • Line 11
  • Line 1 to 3
  • Line 12
  • Line 4 to 6
  • Line 13
  • Line 7 to 9
  • Line 14

<h3>The value of x in between lines 11 and 12</h3>

On line 11, the function F(n) is called and executed.

This function multiplies 10 by 5 and assigns the product to x.

Hence, the value of x in between lines 11 and 12 is 50

<h3>The value of x in between lines 12 and 13</h3>

On line 12, the function G(n) is called and executed.

This function adds 25 to the global value of x (100) and assigns the sum to x.

Hence, the value of x in between lines 12 and 13 is 125

<h3>The program output</h3>

On line 13, the function H(n) is called and executed.

This function adds -25 to the global value of x (125) and assigns the sum to x.

The output is then printed on line 14

Hence, the output of the program is 150

Read more about Python programs at:

brainly.com/question/16397886

7 0
2 years ago
How can you tell that someone is listening to what you through your device ?
Alika [10]

Answer:here are some signs to look out for: Background noise. As with mobile devices, background noise whilst on a call is a sign that somebody else could be listening. Listen out for static, buzzing or clicks on the line.

Explanation:

6 0
3 years ago
Other questions:
  • Write a full class definition for a class named Counter, and containing the following members: A data member counter of type int
    7·1 answer
  • Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
    9·2 answers
  • 2. Which of the following best describes the protocols used on the Internet?
    15·1 answer
  • Can Word Processing (WP) programs be used for DTP? Explain your answer
    7·1 answer
  • Select the correct answer.
    6·2 answers
  • What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
  • Pls say correct guyz pls pls pls
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!