1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
10

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Computers and Technology
1 answer:
olchik [2.2K]3 years ago
8 0

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

You might be interested in
Use the drop-down menus to complete each sentence.
gizmo_the_mogwai [7]

Answer:1 3 and 5 is Columns and 2 4 and 6 is Rows theres your answer.

Explanation: its self explanatory.

3 0
3 years ago
Read 2 more answers
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
Rama09 [41]

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.

6 0
2 years ago
3.8 LAB: Read values into a list
Salsk061 [2.6K]

An example of Read values into a list is:

#!/usr/bin/python

list1 = ['math', 'chemistry', 1995, 2001];

list2 = [1, 2, 3, 4, 5, 6, 7 ];

print "list1[0]: ", list1[0]

print "list2[1:5]: ", list2[1:5]

<h3>What is Python Lists?</h3>

This is known to be a list that is seen as the a most versatile in terms of datatype that are known to be available in Python.

It is one that can be written as a list of comma-separated values that is found in between square brackets.

Note that the most Important thing about a list is that all the items in a list are ones that do not require to be of the same type.

Hence Creating a list is very simple to do and it is done by putting a lot of comma-separated values in between square brackets.

Therefore, An example of Read values into a list is:

#!/usr/bin/python

list1 = ['math', 'chemistry', 1995, 2001];

list2 = [1, 2, 3, 4, 5, 6, 7 ];

print "list1[0]: ", list1[0]

print "list2[1:5]: ", list2[1:5]

Learn more about python list  from

brainly.com/question/24232863

#SPJ1

8 0
2 years ago
Using this statement to answer the following question “FIFA World Cup 2010: (1+9) From Today!” (Ignore Quotation)
Yuliya22 [10]
Free space going around the town states
5 0
3 years ago
⇒PLEASE HELP ME!!!!!!!!∧_∧
saveliy_v [14]
I think it might be Heading & Border
6 0
3 years ago
Read 2 more answers
Other questions:
  • 1.
    13·1 answer
  • Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher sp
    6·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
    13·1 answer
  • True or false? The following deterministic finite-state automaton recognizes the set of all bit strings such that the first bit
    7·1 answer
  • Who is the prince of math?
    5·2 answers
  • Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtm/​
    5·2 answers
  • Who is famous for his three laws of robotics?
    9·1 answer
  • Electronic evidence on computer storage media that is not visible to the average user is called​ ________.
    14·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!