technically a coding question utilizing python how would one calculate a square root

Answers

Answer 1

Answer:

import math

math.sqrt( x )

Explanation:

The basic code that can be written to calculate the square root of a number is as follows

import math

math.sqrt( x )


Related Questions


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
does not cause an error message

Answers

Answer:

Explanation:

Identify the characteristics of syntax errors. Choose all that apply.

programmer did not follow the program language conventions

may be highlighted while writing the program

can be caused by mistyping or misspelling while writing the program

Answer:

Its A B C i got it right

Explanation:

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.

Answers

A. She has a home network with smart home devices

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by  doing home network with smart home devices. The correct option is a.

What are smart devices?

The devices which are operated using the analog signals which carry information.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.

Friend is able to do this by doing home network with smart home devices.

Thus, the correct option is a.

Learn more about smart devices.

https://brainly.com/question/17509298

#SPJ2

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.

Select the correct answer from each drop-down menu.
Complete the following sentences.

_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.

Options for the first box are: managers, A teams, an individuals

Options for the second box are:internal, specific, external

Answers

Answer:

First, A teams, Second ,Specific

Explanation:

adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf

Answers

Answer:

this belongs on r/ihadastroke

Explanation:

Answer: ok

Explanation:

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

Which of the following images illustrates safe driving?

Answers

Answer:

bottom left

Explanation:

Answer:

keep your eyes on the road!!!!

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

How do we know if we can believe the things on the internet?

Answers

Answer:

you have to check for reliability

Explanation:

Answer:

you can't always believe the internet some stuff is false are bended

Explanation:

yea

No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?

Answers

Answer:

You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.

Other Questions
Which expression is equivalent to5(h+9) DNA: TAC GCG TAC CGG ATCmRNA: Amino acids: HELP[ Find the diameter and circumference 6.2 mi PLS HELP I NEED AN ANSWER PLS At the amusement park, Janine bought a bottle of water for $2. She also bought game tickets for $0.50 each. Janine spent a total of $15.Which of the following equations can be used to find the number of game tickets, g. Janine bought?O 0.509 + 2 = 15O2g +0.50 = 15O 0.50g - 2 = 15O 2g -0.50 = 15 What does BAC measure? A. The amount of alcohol in 5ounce drink. B. The amount of alcohol in ones blood. C. The amount of alcohol in ones liver. D. The amount of alcohol brain. Three dogs scout sparky and dusty are playing with a teddy bear. Scout and sparky are pullung the teddy bear to the left describe como an participado en la vida nacional los nuevos grupos sociales Marcie Ann Weber, age 32, takes out $15,000 of a term insurance for a ten year term.annual premium: $ quarterly premium: $ PLEASE HELP ME OUT! WILL GIVE BRAINLIEST FOR WHOEVER COMPLETES ALL OF THEM WITH AN ACCURATE ANSWER (NO LINKS OR YOU WILL BE REPORTED)Refusal Techniques For the following lab, you will try some simulated activities to help youpractice your refusal skills.Please identify a refusal technique to the side of each risky situation and explain how youwould use it in each situation:Risky Situation Refusal Technique How used in each situation:Unsupervised partyBridge jumpingSmoking marijuanaCar racing in the countrySkipping school 2. In 1990, there were 1,200 cell phone subscribers in a small-town of Stephenville. The number of subscribers increased by 75% per year after 1990. How many cell phone subscribers were in Stephenville in 1999? A dog, Skipper, is roaming around the neighborhood. Skipper passes one ofhis favorite spots and lifts his leg to urinate on a fire hydrant. Threesystems at work are: classify the pair of angles shown. HMP is isosceles triangle with base MP, also NPOM and NM = OP Name the postulate or theorem you can use to prove NHM = OHP How can we compare the UK's natural resources to Russia's? What is rising temperatures Which of the following statements represents a correct and sequentially accurate economic explanation? a. If net exports rise, total expenditures on goods and services rises, and the AD curve shifts rightward. b. If investment increases, total expenditures on goods and services falls, and the AD curve shifts leftward. c. If consumption falls, total expenditures on goods and services falls, and the AD curve shifts rightward. d. If consumption falls, total expenditures on goods and services rises, and the AD curve shifts leftward. What is the midpoint of AB when A (-2, 5) and B (4, -5)? C. If Stephanie was short of wrapping paper, how much more did she need? If Stephanie had enough wrapping paper, how much of the ten feet was left over? What percentage of the global water supply is fresh water? 6 percent 35 percent 1 percent 10 percent A farmer wants to know the effect of using various amounts of fertilizer in relation to the yield of his crops. He subdivided a portion of his land into 10 separate, but essentially equal, plots. He divided the land so that all of the plots had equal exposure to sun, rain, and other environmental conditions. He randomly selected 2 of the 10 plots and spread 2 pounds of fertilizer over each of them. Then he randomly selected 2 of the remaining plots and spread 3 pounds of fertilizer over each of them. He continued with the last sets of plots in the same manner, spreading 4, then 5, then 6 pounds of fertilizer over each of them. Below is a computer output for linear regression of amount of fertilizer versus yield for the 10 plots of land.Predictor Coef SE Coef T PConstant 10.100 0.7973 12.67 0.000Fertizer 1.50 0.1879 6.12 0.000S= 0.8404; R-Sq= 82.4% R-Sq(adj) = 80.28%Required:What is the equation of the least squares regression line from this sample?