Answer:
Option B, Vanishing point
Explanation:
The complete question is
Where do the projection lines converge in a perspective sketch?
A. the ground line
B. the vanishing line
C. the eye point
D. the horizon line
Solution
A point lying on the image of a perspective drawing where the drawings ( two-dimensional perspective projections) of two parallel line meet in three dimensional space is known as Vanishing point
suppose the system employs delayed branching and uses a bht to predict the behavior of conditional branch instructions. how many instructions have to be flushed from the pipeline for each incorrect branch prediction?
One instruction has to be flushed from the pipeline for each incorrect branch prediction.
What is pipeline?
A pipeline in software engineering is a chain of processing units structured so that the output of one element is the input of the next; the name refers to a physical pipeline. Typically, some buffering is supplied between consecutive elements. The information that goes through these pipelines is frequently a stream of records, bytes, or bits, and the pipeline pieces may be referred to as filters; this is also known as the pipes and filters design pattern. Function composition is akin to connecting items in a pipeline.
Incorrect branch predictions require that the pipeline be flushed and restarted from the branch instruction. This requires four instructions to be flushed from the pipeline. For each incorrect branch prediction, the system has to flush instructions from the pipeline equal to the depth of the pipeline.
To learn more about pipeline
https://brainly.com/question/27907539
#SPJ4
Which of the following refers to a software firewall installed on a client or server?
A) A. Host firewall
B) B. Hardware firewall
C) C. Transport Layer (Layer 4)
D) D. Client
The correct answer is A) Host firewall.
A host firewall refers to a software-based firewall that is installed on a client or server system. It is designed to monitor and control network traffic at the host level, providing an additional layer of security by filtering incoming and outgoing network packets based on predetermined rules. Unlike a hardware firewall (B), which is a separate physical device that sits between a network and the system, a host firewall is installed directly on the client or server machine. It operates by examining network traffic and applying security policies to determine which packets are allowed or denied.
Transport Layer (Layer 4) (C) refers to a specific layer of the network protocol stack that handles end-to-end communication between hosts. It is not directly related to a software firewall. "Client" (D) is a general term that can refer to a user's computer or device that connects to a network or server. While a host firewall can be installed on a client, it is not an exclusive term for a software firewall.
Learn more about Host firewall here:
https://brainly.com/question/28742495
#SPJ11
explain whether the information in the microsoft office file properties is reliable for forensic purposes.
The information found in Microsoft Office file properties may not always be reliable for forensic purposes.
While these properties can provide valuable information such as the file creator, creation and modification dates, and version, they can also be easily manipulated or deleted. In addition, metadata stored in file properties may not be comprehensive and may not capture all actions taken on the file.
Therefore, it is important to supplement the information found in file properties with other forensic techniques and tools to ensure the accuracy and reliability of the evidence collected.
You can learn more about Microsoft Office at: brainly.com/question/14984556
#SPJ11
100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.
The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.
Learn more about Pseudo code here:
https://brainly.com/question/21319366
#SPJ11
How can you tell if an email has an attachment? How do you download it? What folder does it download to?
Hello,
I need help with (MATLAB) programs because I want to create a task to simulate the probability of getting the following hands on a given:
•Couple
•Two pairs
•Triss
•Quad number
•Cook
•Ladder
Note that if the deal contains four identical cards, it only counts as a four and not also a pair or three.
The statistics should be plotted as a bar chart where the height of the bars indicates
the probability in percent. The program that simulates the statistics must receive
one argument, the number of rolls to base the statistics on.
To simulate the probability of getting specific hands in a card game using MATLAB, you can create a program that takes the number of rolls as an input and generates statistics. The statistics can be plotted as a bar chart, where the height of the bars represents the probability in percentage.
To create the MATLAB program, you would start by defining the rules of the card game and the conditions for each hand (e.g., couple, two pairs, triss, quad number, cook, ladder). Then, you can implement a loop that performs the desired number of rolls, randomly generating card combinations and keeping track of the occurrence of each hand.
Within the loop, you would check if the current combination matches any of the defined hands. If a match is found, you increment the corresponding counter. After the loop completes, you calculate the probabilities by dividing the frequency of each hand by the total number of rolls and multiplying by 100 to get the percentage.
Finally, you can use the bar chart function in MATLAB to plot the statistics, where each hand corresponds to a bar, and the height of the bar represents the probability of obtaining that hand.
By executing this program with different numbers of rolls, you can observe how the probabilities of getting specific hands vary and gain insights into the dynamics of the card game.
learn more about MATLAB here
https://brainly.com/question/30760537
#SPJ11
Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
hola una pregunta dónde está el vídeo ?
hola una pregunta dónde está el vídeo ?
As per US copyright laws, Jean's copyright ends in 1988 . Until then, if other people use parts of Jean's book in their work, then they need to obtain permission from .
Answer:
Jean
Explanation:
Copyright is a legal intellectual property right, exclusively assigned to originator of a creative work - for its publish, performance, recording etc, for a fixed period of time. The creative work can be used by any other person or party, by permission of copyright owner only.
So : As per US copyright laws, Jean's copyright ends in 1988 .Until then, if other people use parts of Jean's book in their work, then they need to obtain permission from Jean
Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the words, but it can also contain additional words.
A keyword set to broad match type will display your ad if the search term contains the same order of the words.
Definition of Broad MatchBroad match is a keyword match type used by search engines to help ads determine variable terms that are eligible to match their keyword by providing a wide range of keyword searches which has relation or similarities to a particular keyword.
Broad match generally help campaigns by ads to improve the performance to a great extent.
Other types of keyword match types available to users are:
modified broad match phrase matchexact matchnegative match.See related answer where broad match is applied: https://brainly.com/question/15849818
The act of color balancing in film is known as
A:Blue
B:white
C:Black
D:Gray
which answer illustrates “compound interest”
Answer:
d- you earn interest on the money in your savings account. Then you, in addition earn interest on interest
Explanation:
The compound interest means the interest i.e. earned on the money that saved by you and the interest you earned.
Therefore as per the given options, the last option is correct as it represents the interest earned in the saving account plus it earns interest on interest
Hence, all the other options are incorrect
Which of these might be an example of an advertiser's target group? A. People who watch a variety of TV shows B. People the advertiser knows nothing about C. People who live in the same region of the country D. People who have no access to media
An example of an advertiser's target group is: B. People the advertiser knows nothing about.
What is an advertisement?An advertisement can be defined as a group of consumer promotions programs which is designed and developed with the sole intention of making the various goods or services that are being offered by a business firm to become known, popular and familiar to all of its customers and potential customers.
This ultimately implies that, consumer promotions programs such as online display and television advertisements, can help a business firm in the following positive ways:
To generate store traffic.To enhance brand loyalty.To facilitate and influence the final decision of a customer to purchase an item.In this context, we can infer and logically deduce that an example of an advertiser's target group is people the advertiser knows nothing about.
Read more on advertisements here: https://brainly.com/question/1658517
#SPJ1
describe how you would attempt to build a growth-chamber for growing plants. the device would need to be completely powered by a person and grow plants such as sugar beets.
To build a human-powered growth chamber for growing sugar beets, one could create a system that utilizes human energy to generate the necessary power for lighting, temperature control, and irrigation. The design could incorporate a stationary bicycle or similar mechanism that converts human pedaling into electrical energy.
This energy could be used to power LED grow lights, fans for air circulation, and a water pump for irrigation. Additionally, the growth chamber should be equipped with sensors to monitor and maintain optimal environmental conditions for sugar beet cultivation, including temperature, humidity, and nutrient levels.
Creating a human-powered growth chamber requires a thoughtful design that efficiently harnesses human energy. The stationary bicycle or similar mechanism would be connected to a generator, which would convert the rotational energy from pedaling into electrical energy. This energy can then be stored in batteries or directly used to power the various components of the growth chamber. LED grow lights are ideal for providing the necessary light spectrum for plant growth while minimizing energy consumption
Sensors play a crucial role in monitoring and controlling environmental parameters, enabling adjustments to temperature, humidity, and nutrient levels as needed. By combining human power with efficient technology, a sustainable and self-sufficient growth chamber can be created for cultivating sugar beets.
learn more about environmental parameters here
brainly.com/question/32321815
#SPJ11
an iterative algorithm is simpler than a recursive algorithm and thus easier to write, code, debug, and read. true or false
The statement that an iterative algorithm is simpler than a recursive algorithm and thus easier to write, code, debug, and read is not entirely true. Both iterative and recursive algorithms have their own strengths and weaknesses, and the choice between them depends on the problem at hand.
Iterative algorithms are usually better suited for problems that can be solved using a loop, where the number of iterations is known in advance. They are generally faster and use less memory than their recursive counterparts. Iterative algorithms can be easier to understand and debug because they do not involve multiple function calls and the call stack.
On the other hand, recursive algorithms are better suited for problems that can be solved by breaking them down into smaller subproblems. They can be more elegant and concise than iterative algorithms and are often easier to reason about. Recursive algorithms can also be used to traverse complex data structures, such as trees and graphs. In summary, the choice between iterative and recursive algorithms depends on the specific problem and the requirements of the solution. Both have their own advantages and disadvantages, and a skilled programmer should be able to choose the appropriate approach based on the problem at hand.
Learn more iterative algorithm here:
https://brainly.com/question/21364358
#SPJ11
Please help, this question is from plato.
What is the purpose of the domain name?
The domain name: (.net , .com , org , .gov)
is an example of a service provider. The domain name .gov.nz is an example of a (New york , New Zealand, news, commercial)
government website.
Answer:
New Zealand government
Explanation:
Answer:
.net is for service providers and .gov.nz is for new Zealand governement
Explanation:
If you don't like the color of your code, press Ctrl+Shift+A, type Jump, and click Jump to Colors and Fonts. You will be taken to the settings page where you can modify the color of the code element at the caret. T/F?
True. In IntelliJ IDEA, you can modify the color and font settings for different code elements using the "Jump to Colors and Fonts" feature. To access this feature, you can press Ctrl+Shift+A, type "Jump",
and then click "Jump to Colors and Fonts" in the search results. This will take you to the settings page where you can modify the color of the code element at the caret or any other code element.
Once you are on the Colors and Fonts settings page, you can select the code element you want to modify from the list on the left and then use the options on the right to change its color, font, or other attributes. After making your changes, you can click "Apply" or "OK" to save the new settings and see the changes reflected in your code.
learn more about code here:
https://brainly.com/question/31228987
#SPJ11
you are given three variables p, q, and r of type person. the three variables have been correctly initialized. write a piece of code that writes the initial value of p in q, the initial value of q in r, and the initial value of r in p. try to make your code as compact as possible
This code is very concise and efficient in swapping the initial values of the three variables.
Write a piece of code that writes the initial value of p in q, the initial value of q in r, and the initial value of r in p?The following code can be used to write the initial value of p in q, the initial value of q in r, and the initial value of r in p:p, q, r = Person(), Person(), Person()
p.__dict__, q.__dict__, r.__dict__ = q.__dict__, r.__dict__, p.__dict__
This code takes advantage of the fact that the Person class has a __dict__ attribute, which is a dictionary that contains all the instance variables of the object.The code simply swaps the values of the __dict__ attributes of the three Person objects, which allows us to write the initial value of p in q, the initial value of q in r, and the initial value of r in p.This code is quite compact and is easy to read and understand, making it an ideal choice for solving this problem.p.name = q.name;
q.name = r.name;
r.name = p.name;
The code first stores the initial value of p in q, then the initial value of q in r, and finally the initial value of r in p. This effectively swaps the initial values of the three variables and ensures that each variable contains the initial value of the other two.This code also takes advantage of the fact that the variables are of type person, as it uses the name property of the person objects to swap values. This code is also very compact and easy to read, making it an ideal solution for swapping the initial values of the three variables.To learn more about a piece of code that writes the initial value refer to:
https://brainly.com/question/28498224
#SPJ4
1.
Which of the following is NOT caused by alcohol?
Answer:
What are the choices
Answer:
Explanation:reduced concentratjon
inhibited comprehension
decreased coordination
increased heart rate
Fuses and lighting are items that the engineering
division would maintain and service as part of the operation’s
__________ system. *
a. electrical
b. plumbing
c. HVAC
d. refrigeration
Fuses and lighting are items that the engineering division would maintain and service as part of the operation’s a) electrical system.
An electrical system is the set of components and systems that provide electric power to a variety of machinery and equipment. Electrical systems are a critical aspect of any industrial process, whether it's a massive manufacturing plant or a simple machine that performs a specific function. Engineers and technicians who specialise in electrical systems work to ensure that the equipment operates safely and efficiently.
To conclude, Fuses and lighting are items that the engineering division would maintain and service as part of the operation’s electrical system.
Therefore, the correct answer is a. electrical
Learn more about electrical system here: https://brainly.com/question/31369711
#SPJ11
in python, if you executed name = 'lizz' , what would be the output of print(name[0:2]) ?
In python, if you executed `name = 'lizz'`, the output of `print(name[0:2])` would be `'li'`.
This is because the `[0:2]` notation specifies a slice of the string `name` starting at index 0 and ending at index 2 (not inclusive). So, the first two characters of the string `'lizz'` are `'li'`, and that is what would be output by the `print` function.
Here is the full code and output:
```python
name = 'lizz'
print(name[0:2])
```
Output:
```
li
```
In the code name[0:2], the 0:2 indicates that you want to access the characters in the string starting at index 0 (the first character, 'l') and up to, but not including, index 2 (the third character, 'z'). This means that the substring that is returned is 'li'.
Learn more about Python string slicing here:https://brainly.com/question/29845927
#SPJ11
how many different identifiers can the following bnf ruleset generate? ::= a | b | c | ... | x | y | z ::= |
The given BNF ruleset is: ::= a | b | c | ... | x | y | z The given ruleset has 26 alphabets (a to z) and the empty string. As there are 26 alphabets, the given BNF ruleset can generate 27 different identifiers.
The correct option is 27.
An identifier is a sequence of characters in a program that identifies and names variables, functions, and other entities. Identifiers are user-defined names that represent various elements of a program such as variables, functions, structures, etc.
The given ruleset has 26 alphabets (a to z) and the empty string. the privileged processor mode is called kernel mode and the nonprivileged processor mode is called user mode. Kernel mode is the most privileged mode on a computer. It allows direct access to hardware, memory, and processes. As there are 26 alphabets, the given BNF ruleset can generate 27 different identifiers.
To know more about empty visit;
https://brainly.com/question/16588531
#SPJ11
Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hint: the original letters were shifted,for example if it is shifted by 1 that means Z becomes A , A becomes B, etc. You need to know the number of shifts)
Answer:
Zoom, Zoom, Zoom We’re going to the moon. If you want to take a trip, Climb aboard my rocket ship.
Explanation:
I got it. This is a caesar cipher with 3 shifts.
you are an administrator in stormwind studios. you are trying to set up your windows defender firewall to allow dns inbound and outbound rules. which port number will you set up?
You work for Stormwind Studios as an administrator. You want to enable DNS incoming and outbound rules in your Windows Defender firewall. The port number that you will set up is Port 53. The correct option is A.
What are port numbers?An internet or other network message's port number can be used to specify the precise process to which it should be sent when it reaches a server. All network-connected devices have standardized ports with a unique number installed.
In order to transmit DNS requests, DNS needs Port 53, which is almost always open on systems, firewalls, and clients.
Therefore, the correct option is A, Port 53.
To learn more about port numbers, refer to the link:
https://brainly.com/question/28940717
#SPJ1
The question is incomplete. Your most probably complete question is given below:
Port 53
Port 20
Port 23
Port 25
Consider the following code.
public void printNumbers(int x, int y) {
if (x < 5) {
System.out.println("x: " + x);
}
if (y > 5) {
System.out.println("y: " + y);
}
int a = (int)(Math.random() * 10);
int b = (int)(Math.random() * 10);
if (x != y) printNumbers(a, b);
}
Which of the following conditions will cause recursion to stop with certainty?
A. x < 5
B. x < 5 or y > 5
C. x != y
D. x == y
Consider the following code.
public static int recur3(int n) {
if (n == 0) return 0;
if (n == 1) return 1;
if (n == 2) return 2;
return recur3(n - 1) + recur3(n - 2) + recur3(n - 3);
}
What value would be returned if this method were called and passed a value of 5?
A. 3
B. 9
C. 11
D. 16
Which of the following methods correctly calculates the value of a number x raised to the power of n using recursion?
A.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n);
}
B.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n - 1);
}
C.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n);
}
D.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n - 1);
}
Which of the following methods correctly calculates and returns the sum of all the digits in an integer using recursion?
A.
public int addDigits(int a) {
if (a == 0) return 0;
return a % 10 + addDigits(a / 10);
}
B.
public int addDigits(int a) {
if (a == 0) return 0;
return a / 10 + addDigits(a % 10);
}
C.
public int addDigits(int a) {
return a % 10 + addDigits(a / 10);
}
D.
public int addDigits(int a) {
return a / 10 + addDigits(a % 10);}
The intent of the following method is to find and return the index of the first ‘x’ character in a string. If this character is not found, -1 is returned.
public int findX(String s) {
return findX(s, 0);
}
Which of the following methods would make the best recursive helper method for this task?
A.
private int findX(String s) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s);
}
B.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else return s.charAt(index);
}
C.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index);
}
D.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index + 1);
}
Is this for a grade?
The local variables of a monitor can be accessed by only the local procedures.Select one:TrueFalse
The local variables of a monitor can be accessed by only the local procedures: True
This is because a monitor is designed to synchronize access to shared resources by multiple processes or threads. The monitor encapsulates the shared data and provides access to it through procedures that are part of the monitor's interface.
Local variables are declared within a procedure and are only visible within that procedure. They are used to store temporary data or intermediate results during the execution of the procedure. Since they are not part of the monitor's interface, they cannot be accessed by processes or threads outside of the monitor.
By restricting access to the monitor's shared data through its procedures, the monitor ensures that only one process or thread can access the data at a time, preventing race conditions and other synchronization issues. This makes monitors an effective mechanism for implementing synchronization in concurrent programs.
For more questions on variables
https://brainly.com/question/28248724
#SPJ11
Dan is working with a team that is integrating an application with a database system. Which of these statements are true with regard to database systems?
The testing phase of the SDLC creates databases.
Selection of a DBMS occurs during the designing phase of the SDLC.
Database development also has a life cycle, with phases similar to those of the SDLC.
All compilers intrinsically support database creation.
Databases use query language to perform operations.
Answer:
Database development also has a life cycle, with phases similar to those of the SDLC.
Databases use query language to perform operations.
Explanation:
PLATO :) no prob btw
849 352 768 493 527 sequence
Look at them like this: Click to show spoiler. Further explanation: Click to show
849, 352, 768, 493, 527 - Unus
write a c program to display the series: 1,8,27,64,125
num_list = [1, 8, 27, 64, 125]
for x in range ( len( num_list) ) :
print (num_list[x])
which item is developed last in the cyclical process?
Answer:
Design Process
Explanation:
The multistep process by which designers and engineers design, build, and taste a new product is called the Design Process. There are multiple steps, including exploring, designing, planning, making, testing, and revising.
Answer:
Explanation:
Because of the issues that have been sketched above, a number of other methods of project management have emerged in recent years. These methods are particularly suited for IT-development projects. Examples of these relatively new streams within project management include DSDM, RUP, eXtreme Programming (XP), RAD and agile project management (McConnell, 1996; Kroll, 2004; Chromatic, 2003; Stapleton, 2002, [ii], [iii])
Although the above-mentioned methods of project management differ according to a number of aspects, they are essentially the same. Because the path toward the final goal of IT projects has proved so uncertain, these methods assume that the goal will be achieved in a number of short cycles. This is the background for the term cyclical project management for these methods
A group of statisticians at a local college has asked you to create a set of functions that compute the median and mode of a set of numbers, as defined in Section 5.4. Define these functions in a module named stats.py. Also include a function named mean, which computes the average of a set of numbers. Each function should expect a list of numbers as an argument and return a single number. Each function should return 0 if the list is empty. Include a main function that tests the three statistical functions. Ask users to enter the list of numbers, and then choose which function to apply to those numbers. After the single number is returned from the correct function, display to the user the list of numbers, the function selected and the answer in a format that is easy to understand.
Answer:
from functools import reduce
def mean(mylist):
score = reduce(lambda x,y: x + y, mylist)/ len(mylist)
return score
def median(mylist):
sorted(mylist)
list_len = len(mylist) % 2
i = round(len(mylist)/2)
x = len(mylist)//2
if list_len == 0:
median = (mylist[x] + mylist[x+1]) / 2
else:
median = mylist[i]
return median
def mode(mylist):
unique = set(mylist)
unique = list(unique)
collector = [mylist.count(key) for key in unique]
maxi = max(collector)
loc = collector.index(maxi)
return unique[loc]
def main():
scores = input( 'Enter list of numbers: ').split(",")
scores = [int(score) for score in scores]
operation = input('Enter operation: ')
operator = ['mean', 'median', 'mode']
for x in iter(list, 0):
if operation in operator:
break
print("Invalid operation: ")
operation = input('Enter operation')
index_loc = operator.index(operation)
if index_loc == 0:
return mean(scores)
elif index_loc == 1:
return median(scores)
#return np.median(scores) can be used of the defined function
elif index_loc == 2:
#return stats.mode(scores)[0] can be used of the defined function
return mode(scores)
print( main( ) )
Explanation:
The main python function calls conditionally three statistical functions namely mean, median and mode. It prompts for user input for a list of integer numbers and a function name name to return the corresponding result.