1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
7

Write a Python program to convert temperatures to and from celsius, fahrenheit.

Computers and Technology
1 answer:
Rudiy272 years ago
3 0

Answer:

https://www.w3resource.com/python-exercises/python-conditional-exercise-2.php

You might be interested in
What is the minimum amount of hard drive space required for a 64-bit Windows 10 installation?
BaLLatris [955]

The minimum requirements for a 64-bit Windows 10 installation are 2 GB of RAM and a minimum of 16 GB of space on the hard drive.

<em>Hope this helps :)</em>

7 0
1 year ago
Thanks for help evreybody
ladessa [460]

Answer:

np

Explanation:

7 0
3 years ago
Read 2 more answers
If you are asked to design an optimal workflow using technology for a car accident claim process, what factors would you conside
yan [13]

Answer:

The factors to consider when building a solution for optical workflow for car accident are the type of claim to be modelled, also to examine the level of automation in vehicles.

Some of the software solutions that meet the requirements are the A1 Tracker  which is very effective to the enterprise business and small business working with insurance. we also have the Mutual expert, Ninja Quote.

Explanation:

Solution

In suggesting an optical workflow for the car accident claim process it is of importance to understand the following factors such as, the type of claim to be modelled, it will be determined by the policy that the clients have for their cars. this will assist in classifying the workflow and giving a clear path of the design.

The number of expected claims is also a very important factor that should be added in the design. Another important factor to examine  the level of automation of the vehicles, this can be very useful in collecting the accident data in a more efficient way and also making it simple to design the model.

Presently there are several workflow softwares in the insurance that have encouraged a great deal and have made the workflow in the insurance companies more greater.

Some of the soft wares are the A1 Tracker  which are very effective and efficient in are highly applicable to the enterprise business and small business working with insurance, the software is convenient in monitoring the work progress in the company.

The other soft wares that have been quite useful in the industry for example the Insly, ISI enterprise, Mutual expert, Ninja Quoter among others. These software are some of the best soft wares available in the market that have met the workflow requirement in the insurance sector.

7 0
3 years ago
Write a function sample_median(n,P) that generates n random values using distribution P and returns the median of the collected
TiliK225 [7]

Answer:

import numpy as np

def sample_median(n, P):  

   return np.median( np.random.choice ( np.arange (1, len(P) + 1 ), n, p = P ) )

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(5, [0.3,0.7])

print(sample_median(5, [0.3,0.7])

Explanation:

  • Bring in the numpy library to use the median function provided by the numpy library.
  • Define the sample_median function that takes in 2 parameters and returns the median with the help of built-in random, choice and arrange functions.
  • Call the sample_median function by providing some values to test and then display the results.    

Output:

4.5

4.0

2.0

1.0

7 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Other questions:
  • Windows enables each user to establish a ____, which identifies to windows the resources, such as apps and storage locations, a
    6·1 answer
  • Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was int
    9·1 answer
  • Which is the most likely reason why scientists change a model?
    12·2 answers
  • 1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has
    14·1 answer
  • Semantic search engines use NLP, contextual cues, synonyms, word variations, concept matching, specialized queries, and other st
    6·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the s
    9·1 answer
  • What is the difference between websites and web page​
    8·1 answer
  • Explain how loops can be utilized in list processing. Please provide Python examples in your response.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!