1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
9

In python:

Computers and Technology
1 answer:
egoroff_w [7]3 years ago
8 0

Python can be used to implement central of tendencies such as mean, median and mode using the statistic module

The program in Python, where comments are used to explain each line is as follows:

#This imports the statistics module

import statistics

#This defines the function that calculates the mode

def calcMode(myList):

   #This prints the mode

   print(statistics.multimode(myList))

#This defines the function that calculates the median

def calcMedian(myList):

   #This prints the median

   print(statistics.median(myList))

#The main method begins here

#This initializes the list

myList = []

#The following iteration gets input for the list

for i in range(10):

   myList.append(int(input()))

#This calls the calcMode method

calcMode(myList)

#This calls the calcMedian method

calcMedian(myList)

Read more about similar programs at:

brainly.com/question/25026386

You might be interested in
John works as a sales representative with Northwind Traders. He has to make a presentation to his customers in another town. The
Sphinxa [80]

Answer:

Laptop.

Explanation:

In the following scenario, John works in the company as the sales representative and he creates a presentation for his users who belongs to another town. The following presentation contains 10GB storage and he also modifying his presentation at the time of traveling.

So, It is clear that he is not using the Mainframe, PDA, or any other desktop computer, he will using his Laptop.

8 0
3 years ago
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
"abstraction" is often used to focus on a general case and ignore a specific instance of a problem. Given this meaning of the wo
prisoha [69]

Answer:

Abstraction is the process of removing or taking away certain characteristics to reduce or hide several very important characteristics.

In OOP (Object Oriented Programming), to increase efficiency and reduce complexity, a programmer hides certain vital data about an object. This is abstraction in programming.

For further clarification, a programmer ensures that the name given to an entity makes sense and most importantly, that it carries relevant aspects, and non essential parts are not included.

3 0
3 years ago
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for auth
irakobra [83]

Answer:A RADIUS server provides authentication through a user name and password encrypted with EAP.

Explanation:

7 0
2 years ago
A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit
enyata [817]

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

5 0
3 years ago
Other questions:
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • you'll be organizing the various databases in your organization, and have recommended hiring a/an?A. internet specialist B. comp
    6·2 answers
  • Why are duplicate tuples not allowed in a relation?
    6·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • What happens when you call someone whose phone is off?
    6·2 answers
  • You're working in a table that has three columns and five rows. Since the first row will be a header row, you want it to span al
    6·1 answer
  • write an algorithm that reads to values, determines the largest value and prints the largest value with an identifying message ​
    15·1 answer
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
  • How is a WAN different from a LAN?
    10·1 answer
  • True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow st
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!