write a program that creates an array of five random integer numbers (remember week 7?), and then displays those numbers.

Answers

Answer 1

A program in any programming language that generates an array of five random integer numbers and then displays those numbers on the screen. Import the random module. Use a loop to generate five random integer numbers and store them in an array.

To write this program, a programming language like Python. the 'random' module to generate random integers and create a list (array) to store those integers. Import the random module. Create an empty list (array) to store the random integers. Use a for loop to generate 5 random integers. Inside the loop, use random. randint() to generate a random integer and append it to the list. After the loop, display the list containing the random integers.

Here's the code for the program python ,import random ,random_numbers = for _ in range(5), random_num = random. randint(1, 100 ,,random_numbers .append(random_num ,print The array of five random integer numbers is:", random_numbers ,This code creates an array of five random integer numbers between 1 and 100 inclusive and then displays those numbers. You can adjust the range of the random integers by changing the arguments inside random. randint().

To know more about programming  visit:

https://brainly.com/question/14368396

#SPJ11


Related Questions

Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positive and negative effects of the internet on business. He recently bought a second-hand camera online, which he hadn't been able to find in any store. A bookstore down the road shut down because people preferred the cheaper online bookstores. Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office. His friend sells printed T-shirts online, storing them in his basement and promoting them on social media. One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

Answers

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

the_______ is a documents , spreadsheet or database that contain personalized information or data base such as name address phone number​

Answers

Answer:

Is called "data source"

the data source is the answering o

Consider the following code.

public void printNumbers(int x, int y) {
if (x < 5) {
System.out.println("x: " + x);
}
if (y > 5) {
System.out.println("y: " + y);
}
int a = (int)(Math.random() * 10);
int b = (int)(Math.random() * 10);
if (x != y) printNumbers(a, b);
}

Which of the following conditions will cause recursion to stop with certainty?
A. x < 5
B. x < 5 or y > 5
C. x != y
D. x == y


Consider the following code.

public static int recur3(int n) {
if (n == 0) return 0;
if (n == 1) return 1;
if (n == 2) return 2;
return recur3(n - 1) + recur3(n - 2) + recur3(n - 3);
}

What value would be returned if this method were called and passed a value of 5?
A. 3
B. 9
C. 11
D. 16

Which of the following methods correctly calculates the value of a number x raised to the power of n using recursion?
A.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n);
}
B.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n - 1);
}
C.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n);
}
D.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n - 1);
}

Which of the following methods correctly calculates and returns the sum of all the digits in an integer using recursion?
A.
public int addDigits(int a) {
if (a == 0) return 0;
return a % 10 + addDigits(a / 10);
}
B.
public int addDigits(int a) {
if (a == 0) return 0;
return a / 10 + addDigits(a % 10);
}
C.
public int addDigits(int a) {
return a % 10 + addDigits(a / 10);
}
D.
public int addDigits(int a) {
return a / 10 + addDigits(a % 10);}

The intent of the following method is to find and return the index of the first ‘x’ character in a string. If this character is not found, -1 is returned.

public int findX(String s) {
return findX(s, 0);
}

Which of the following methods would make the best recursive helper method for this task?
A.
private int findX(String s) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s);
}
B.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else return s.charAt(index);
}
C.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index);
}
D.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index + 1);
}

Answers

i think the answer is C

Is this for a grade?

A _________ conversion involves running the old and new systems simultaneously for a time, which is is rarely used, since it impractical for customer-facing e-commerce systems.

Answers

Small conversions require running the old and new systems simultaneously for a period of time, but they are rarely used because they are impractical for customer-facing e-commerce systems.

Conversion Tactics:

Both conversion tactics aim to make it easier for users to adapt to the new system. The old system is "unplugged" and the new system is turned on when converting directly. The new system must be used by users; there is no other option.

The old system is briefly used in the parallel conversion plan while the new system is turned on. Since there is no backup in the event that significant system flaws are found, the direct approach is riskier.

In the event that a critical flaw in the new system is found, the parallel conversion will continue to operate the old system. However, it is crucial to take into account the expense and additional work associated with using both systems at once.

To know more about conversions, visit: brainly.com/question/29025070

#SPJ4

A _____ is a diagram that depicts a process, system or computer algorithm

a. Code
b. Program
c. Algorithm
d. Flowchart

Answers

The answer to your question is FLOWCHART (d.)

Answer:

D) Flowchart

Explanation:

Because it is the only known diagram from your 4 options.

If you were referencing an e-book what would be the proper citation format?.

Answers

Answer:

Use the standard in-text citation format of author's surname and year of publication to cite an ebook in your work. Include the author's last name and first initial, the year of publication, the italics title of the book, as well as the retrieval information or DOI number in an APA reference list entry.

Hope this helped you! I would appreciate a Brainliest if you wouldn't mind.

you want to install client hyper-v on your new windows 10 computer. of the available choices, which version of windows 10 must be installed?

Answers

To install Client Hyper-V on your Windows 10 computer, you must have Windows 10 Pro, Enterprise, or Education edition installed. Client Hyper-V is not available on Windows 10 Home edition. Here's a step-by-step explanation:

1. Verify that you have Windows 10 Pro, Enterprise, or Education edition installed on your computer. You can do this by pressing Windows key + X, then selecting System. The edition will be displayed under "Windows specifications."
2. Check if your system supports hardware virtualization. To do this, access your computer's BIOS or UEFI settings during startup and ensure that virtualization is enabled.
3. Once you confirm your system's compatibility, open the "Control Panel" and click on "Programs and Features."
4. On the left side of the window, click on "Turn Windows features on or off."
5. In the Windows Features dialog box, locate and check the "Hyper-V" option, then click "OK" to install it.
6. Restart your computer when prompted to complete the installation.

Once these steps are completed, you will have Client Hyper-V installed on your Windows 10 computer.

Know more about Client Hyper-V here:

https://brainly.com/question/30750219

#SPJ11

which protocol is responsible for delivering packets to the right computers?

Answers

The Internet Protocol (IP) is responsible for delivering packets to the right computers on a network.

What is the IP?

IP is a network layer protocol that provides a unique address, known as an IP address, to every device connected to the network.

When a packet is sent, it contains both the source and destination IP addresses, allowing routers and other networking devices to direct the packet to its intended destination based on the destination IP address.

In this way, IP provides the necessary addressing and routing functions to ensure packets are delivered to the correct device on a network.

Read more about internet protocol here:

https://brainly.com/question/17820678

#SPJ1

Joe is covering a music concert with more than 2,000 people in the audience. Which shooting technique should he use to capture the entire audience in one shot?
A.
Dutch angle
B.
tracking shot
C.
track in shot
D.
crane shot
E.
panning shot

Answers

Answer:

e

Explanation:

Answer:

D. Crane Shot

Explanation:

It is also known as the embryonic stem.
A. radicle
B. hypocotyl
C. epicotyl
D. testa
It is a series of activities carried out in a form management system prior to planting the seed or planting materials.
a. pre-planting operation
b. prior planting operation
c. first planting operation
d. start planting operation

Answers

Answer:

A and B, I really hope.

Explanation:

Answer:

the first one is D and the second one is B

A LAN is usually confined in a single building.
True
False

Answers

Answer:

true

Hope it helps.you

defination of user management

Answers

Answer:

User management (UM) is the effective management of users and their accounts, giving them access to various IT resources like devices, applications, systems, networks, SaaS services, storage systems and more

Explanation:

User management (UM) is the effective management of users and their accounts, giving them access to various IT resources like devices, applications, systems, networks, SaaS services, storage systems and more

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

________ can be used to produce automatic responses if data have been altered. ________ can be used to produce automatic responses if data have been altered. SQL code DML triggers Mirroring DDL triggers

Answers

DML triggers can be used to produce automatic responses if data have been altered. SQL code and DDL triggers may also be used, but they are not specifically designed for monitoring and responding to changes in data.

Mirroring is a data replication technology that involves copying data from one server to another without the use of triggers. It ensures data redundancy by maintaining an identical copy of the data on multiple servers, providing a failover mechanism in case of server failure. Mirroring is commonly used for high availability and disaster recovery purposes in database systems.

To know more about DML triggers visit:

brainly.com/question/31200286

#SPJ11

4
Select the correct answer.
Which language is widely used to write programs to process large amounts of numerical data?

A. PHP
B. FORTRAN
C. Prolog
D. Python

Answers

B.
MARK KE BRAINLEST

Answer:

The correct answer is B. FORTRAN.

Explanation:

I got it right on the Edmentum test.

The ALIGN attribute of the P-tag cannot take what value right or left or justify or center?​

Answers

The align attribute of p tag can not take 'much' value

#LETS STUDY

#BRAINLEST LOVE❣️

Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be saved in grayscale?.

Answers

Answer:

BMP

Explanation:

The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows[2] and OS/2[3] operating system

A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a synthetic material?

A. cotton
B. nylon
C. jute
D. silk
E. linen

I need this answer please!! 20 points

Answers

a is the correct answer of the question

Answer: A.

Explanation:

At what layer do routers allow the datagram to hop from the source to the destination, one hop at a time? group of answer choices data link

Answers

Routers operate at the network layer (layer 3) of the OSI (Open Systems Interconnection) model, which is responsible for the transmission of data between different networks. The network layer is responsible for logical addressing and routing, enabling routers to make decisions about how and where to forward packets based on their destination IP address.

When a packet arrives at a router, it examines the destination IP address and consults its routing table to determine the best path for the packet to reach its destination. The router then forwards the packet to the next hop on that path, which may be another router or the final destination device.

By allowing the datagram to hop from the source to the destination, one hop at a time, routers enable packets to traverse multiple networks and reach their intended destinations even if those networks use different protocols or technologies. Without routers, data would be confined to a single network and could not be transmitted beyond its boundaries.

To know more about Routers operate click this link -

brainly.com/question/30583868

#SPJ11

why does hashing prevent hackers from stealing the contents of a password file?

Answers

Answer:

Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.

Explanation:

pls mark brainliest

the advancement in speed of transportation is attributed to invention of this device

Answers

The automobile is the invention

where in the windows registry would you store a key that starts an executable

Answers

When considering where in the Windows registry you would store a key that starts an executable, the appropriate location is the "Run" key.

The "Run" key is located in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run for all users or HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run for the current user.Explanation:The Windows registry is a hierarchical database that stores low-level configuration information for the Microsoft Windows operating system. The registry includes settings for drivers, operating system components, installed software, and various other parameters. The registry can be edited manually, but it is not recommended for most users as errors can cause serious problems.

A startup program is an executable program that runs automatically when you start your computer. In order to run automatically, the program needs to be added to the Windows registry in a specific location. The appropriate location is the "Run" key. The "Run" key is located in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run for all users or HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run for the current user.When a program is added to the "Run" key, it will automatically start whenever you start your computer. This can be useful for programs that you use frequently and want to have available right away. However, too many programs in the "Run" key can slow down your computer's startup time and overall performance. Therefore, it is important to be careful when adding programs to the "Run" key.Conclusion:In conclusion, the appropriate location in the Windows registry to store a key that starts an executable is the "Run" key, which is located in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run for all users or HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run for the current user.

To know more about programs visit:

brainly.com/question/30613605

#SPJ11

Write a Python program in Python-IDLE(in Script mode), save and upload in the
classroom for the following. 1) To calculate addition, subtraction, multiplication
of any 2 values which you will input while running the program. 2) To input 5
values, calculate total and average of those five values.
Your answer​

Answers

num1 = int(input(“Enter First Number: “)
num2 = int(input(“Enter Second Number: “)
add_num = num1 + num2
sub_num = num1 - num2
mult_num = num1 * num2
div_num = num1 / num2
print(“Results”)
print(“Addition: “ + add_num)
print(“Subtraction: “ + sub_num)
print(“Multiplication: “ + mult_num)
print(“Division: “ + div_num)

WHAT ARE THE USES OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

Answers

As for this kind of definition question, you can search the answer online. Thank you

What does Projective structure from motion mean

Answers

Answer:

the recovery of the three-dimensional structure of

a scene from correspondences established by tracking n points in m pictures. This

time, however, we will assume a perspective projection model. Given some fixed

world coordinate system, we can write

Explanation:

what is a foreign key​

Answers

Answer:A foreign key is a set of attributes in a table that refers to the primary key of another table. The foreign key links these two tables. Another way to put it: In the context of relational databases, a foreign key is a set of attributes subject to a certain kind of inclusion dependency constraints

Explanation: The foreign key links these two tables. Another way to put it: In the context of relational databases, a foreign key is a set of attributes subject to a certain kind of inclusion dependency constraints

Explanation:

A foreign key is a set of attributes in a table that refers to the primary key of another table. The foreign key links these two tables.

all network switches require substantial configuration before they can be put into operation in a network. true false

Answers

The statement "All network switches require substantial configuration before they can be put into operation in a network" is partially true. However, a long answer would be required to explain why. Here's why:Explanation:Most network switches require some configuration before they can be used in a network.

There are, however, several unmanaged switches available on the market that do not require configuration, making it simple to add them to a network quickly. Furthermore, several switches are now designed to be simple to set up and operate with no technical knowledge required. On the other hand, many network switches are quite complicated and will require considerable configuration to function properly.

They can have dozens of ports and advanced features such as VLAN tagging and port mirroring, and setting up these features can take some time and expertise. Some switches come with pre-installed templates, making it easier for switches require some degree of configuration, there are exceptions to this rule, and the amount of configuration required varies depending on the type of switch.

To know more about configuration visit:

brainly.com/question/32886519

#SPJ11

A beam of light travels in air and then passes through a piece of glass at an angle of 45 degrees to the normal. As the light passes from the air into the piece of glass, the light ray is bent, what is the angle of refraction measured from the normal?

Answers

Answer:

The angle of refraction measured from the normal is approximately 28.13°

Explanation:

The angle of refraction is the angle made by the refracted ray and the normal line drawn at the point where the ray passes through the interface of the two mediums

According to Snell's law, we have;

\(_1 n_2 = \dfrac{n_1}{n_2} = \dfrac{sin \, \theta _2}{sin \, \theta _1}\)

n₁·sin (θ₁) = n₂·sin(θ₂)

Where;

₁n₂ = The refractive index of air to glass = 1.5

n₁ = The refractive index of air = 1

n₂ = The refractive index of glass ≈ 1.5

θ₁ = The angle of incidence = 45°

θ₂ = The angle of refraction measured from the normal

Therefore, we have;

1/1.5 = sin(θ₂)/sin(45°)

sin(θ₂) = sin(45°)/1.5 = (√2)/2/(3/2) = (√2)/3

∴ θ₂ = arcsin((√2)/3) ≈ 28.13°

The angle of refraction measured from the normal = θ₂ ≈ 28.13°.

Eva needs to hire someone that has in-depth knowledge of all of her network devices and can keep her network running efficiently. Which of the
following professionals does Eva need to hire?
A. a network architect
B.a network security analyst
C.a network analyst
D. a network administrator

Answers

Answer:

D. A network administrator.

Explanation:

A network administrator is responsible for the day-to-day operations of a computer network, including installing, configuring, and maintaining network devices, such as servers, routers, switches, and firewalls. They are knowledgeable about the technical aspects of a network and can troubleshoot and resolve issues as they arise. They are also responsible for ensuring that the network is secure, and that data is backed up and protected. Therefore, a network administrator would be the best fit for Eva's needs, as they have in-depth knowledge of network devices and can keep her network running efficiently.

While network architects design and plan computer networks, network security analysts focus on protecting networks from cyber threats, and network analysts analyze and optimize network performance, they may not have the same level of day-to-day operational knowledge as a network administrator.

what to do if you clicked on a phishing link on iphone?

Answers

They will have your ip but as long as you did not put any information into the site you are good if you did change email and password for the account. Explanation
Other Questions
Piston Limited is a manufacturer of energy saving bulbs. To manufacture the finished product one unit of component LED is required. Quarterly requirement of component LED is 18,000 units, the cost being 300 per unit. Other relevant details for the year 2018 are:Cost of placing an order: N2,250Carrying cost of inventory: 12% of purchase costMaximum Lead time: 20 daysMinimum Lead time: 8 daysMaximum Consumption: 400 units per dayMinimum Consumption: 200 units per dayYou are required to explain and calculate:i. Re-order quantityii. Re-ordering leveliii. Minimum inventory leveliv. Maximum inventory level In a country with a small open economy, government has ordered a mass domestic introduction of fully automatic retail and teller machines in all shops/supermarkets for consumers to reduce human contact during pandemic. All displaced shop assistances and cashiers have received 6-month wages and free retraining programs supported by the government and get employment in other sectors. Imagine that the cost of such technology has been reduced considerably, while quality is improved.Using 3-equation macroeconomic model for Open economy with labour market, draw a relevant diagram and explain the likely possible effects of these automation technology and the government measures on the key macroeconomic indicators. Clearly state your assumptions and explain any shifts in your diagram .Explain your economic arguments, and identify likely short-term macroeconomic impacts of this mass automation technology and government measures on:(a) the labour market equilibrium ,(b) private investment ,(c) real exchange rate ,(d) output (e) inflation from the initial measurements you determine the electrode slope is -55.8 mv. following the same procedure as described in your lab manual, you measure the initial potential of an unknown to be 86.1 mv. after the addition of 0.102 m fluoride the potential drops to 38.6 mv. what is the molarity of fluoride in the original, undiluted, control sample? (report your answer as the significance of the concentration with 3 significant figures, assuming the exponent is to the power of -4.) How many times does the ghost appear in Hamlet Act 1 Scene 1?. El primer maestro de arte de Picasso fue su padre. Which of the following was part of Lincoln's appeal to northern voters in the 1860 election?(A) his position to carry the "doubtful states" needed for victory(B) his appeal to immigrant voters as an earlier candidate of the Know-Nothing Party(C) his emphasis on the political but not moral dimension of the sectional conflict(D) his antipathy to the Union Some bonds issued by the u. S. Treasury are inflation protected, meaning that what the bond pays at maturity and the regular interest payments are adjusted for changes in the cpi. You can think of the interest rate on an inflation-protected bond as a real interest rate, while the interest rate on a bond that is not inflation-protected is a nominal rate. If investors expect inflation, which type of bond should have a higher interest rate?. find the value of x. round to the nearest tenth. Find the dependent valuefor the graphy = 4x + 13when the independent value is 2.y = [?] is teaching better in English or in the country's native languagegive long and reasonable points Find the Fare without Tip: 3 passengers, 9.5 miles.O $19.54O$16.70O $18.29O$17.48 Equipment with a cost of $160,000 has an estimated residual value of $10,000 and an estimated life of 4 years or 12,000 hours. It is to be depreciated by the diminishing value method with a constant depreciation rate of 37.5%. What is the amount of depreciation expense for the first full year, during which the equipment was used 3,300 hours?Select one:a. $44,000b. $56,250c. $60,000d. $41,2502. A high inventory turnover indicates:Select one:a. inventory consists of mostly high value products.b. inventory consists of mostly low value products.c. a low level of funds tied up in inventory.d. a high level of funds tied up in inventory.3. If a cheque was correctly written and paid by the bank for $354 but was incorrectly recorded on the company's books for $345, the appropriate treatment in performing bank reconciliation would be to:Select one:a. add $9 to the bank statement's balanceb. add $9 to the cash book balance.c. deduct $9 from the bank statement's balance.d. deduct $9 from the cash book balance Whe the following dafa and answer the punstion bolow. Arituat demand in 25,000 and holding cost is T thi Which vendar offers the fownet total cost? Yea will need to first calculate the following? a) Annual order cost b) Annual holding cont c) Anmual fortistic cost d) Aninual putchase cost how could the banks mentioned in this case have mitigated or prevented the thefts? 2. how would smart cards be safer than magnetic swipe cards? why? 3. why would this type of distributed bank theft be faster and incur larger losses than a traditional strong-arm bank robbery? 4. are cybercrime efforts becoming more targeted? why? 5. why are organizations hesitant to report losses related to cybercrime? 6. why are malicious insiders a focus of security experts? A pencil factory has increased the amount ofpencils produced from 1200 to 1500 pencils. Whatis the percentage increase?HURRY PLEASE HELP. "ANSWER ONLY IF YOU KNOW THE ANSWER" On January 1, 2021, Wise Corporation leased equipment to Slim Company. The lease term is eight years. The first payment of $675,000 was made on January 1, 2021. The equipment cost Wise Corporation $3,600,000. The present value of the lease payments is $3,961,183. The lease is appropriately classified as a sales-type lease. suming the interest rate for this lease is 10%, how much interest revenue will Wise record in 2022 on this lease b) The company has found a new national chain retailer who will pay more money for more cans of paint, compared to its current small business retailers. This new retailer will increase the company's profits. How can the company make this switch to the new retailer ethically? (2 points) 4. Find the slope of the linethat passes through the two points.(2.8) (10,2) Which of the following values has an exact square root?