Implement the simulation of a biased 6-sided die which takes the values 1,2,3,4,5,6 with probabilities 1/8,1/12,1/8,1/12,1/12,1/
hjlf
Answer:
see explaination
Explanation:
import numpy as np
import matplotlib.pyplot as plt
a = [1, 2, 3, 4, 5, 6]
prob = [1.0/8.0, 1.0/12.0, 1.0/8.0, 1.0/12.0, 1.0/12.0, 1.0/2.0]
smls = 1000000
rolls = list(np.random.choice(a, smls, p=prob))
counts = [rolls.count(i) for i in a]
prob_exper = [float(counts[i])/1000000.0 for i in range(6)]
print("\nProbabilities from experiment : \n\n", prob_exper, end = "\n\n")
plt.hist(rolls)
plt.title("Histogram with counts")
plt.show()
check attachment output and histogram
An appropriate use of social media includes: C. having thought-provoking debates.
<h3>What is
social media?</h3>
Social media refers to a collection of Internet software applications which are designed and developed so as to avail end users an ability to add, share and discuss different information, as well as enhance collaboration and debates between community members over the Internet.
In this context, we can logically deduce that having thought-provoking debates and making constructive posts are appropriate use of social media.
Read more on social media here: brainly.com/question/25546524
#SPJ1
Answer:
If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.
Answer:
File history
Explanation:
File history recovery method allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.
Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.
Explanation:
in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.
The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.
besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:
1. static routing protocols
2. dynamic routing protocols.