Write a function silence (typecode, length) that returns a new data array containing all zeros of the given type code and length.

python programming

Answers

Answer 1

Answer:

Following are the code to this question:

import array as a#import package array  

def silence(typecode, length):#defining method silence that accepts two parameters  

   Val= a.array(typecode, [0]*length)#defining Val variable that stores zeros of the given type code and length

   return Val# use return keyword for return Val variable value

typecode = input('Enter typecode value: ')#use input method for input

length = int(input('Enter length value: '))#defining length variable that input integer value

print(*(silence(typecode, length)))#use print method to call silence method

Output:

Enter typecode value: b

Enter length value: 10

0 0 0 0 0 0 0 0 0 0

Explanation:

description of the code:

In the above-given Python code, Firstly we import a package that is the array, after that a method "silence" is defined that accepts two variables in its parameter that is "typecode and length". Inside the method, the "Val" variable is declared, which is used to calculate and store all zeros of the typecode and length variable. Outside the method, "typecode and length variable" is used for input the value from the user end-use the print method to call the function "silence" with an asterisk.

Related Questions

ATM machines respond to request in__________​

Answers

Answer:

Atm machine respond to request in atm card

ATM machines respond to requests in ATM card.

What is an ATM Machine?

ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.

ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.

Hence, the ATM card gives commands to the ATM machine.

Read more on atm machine:

https://brainly.com/question/24471380

#SPJ2

A computer professional who designs ways to organize, store, and retrieve data is a database .

Answers

Answer:

Database Designer

Explanation:

Database design means organization of data as per the database model. The database designer what data should be stored and how the various data elements interrelate.

A database designer designs database design that includes indexes, tables, constraints, views, procedures, triggers and other constructs needed to store, retrieve and delete persistent objects.

One can become a database designer by following the below mentioned steps:

Earn a Bachelor's Degree in a Related Field Or Gain Foundational Training.

First earn a Bachelor's degree

Gain real world database development experience.

Acquire IT Database certifications and develop Soft Skills

{Netiquette Question Worth 50 points}

[Which would be a responsible use of technology used by victims of cyber bullying]

•Finding ways to strike back at bullies online

•Buying software that allows them to track down bullies

•Changing passwords and screen names regularly

•pretending to be someone else to hide their identity

Answers

Answer:

Changing passwords and screen names regularly

Explanation:

I did it on edgenuity

Don't click on this I am testing

Answers

Don't click on this I am testing... I want the points so.

Answer:

ok

Explanation:

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n) __________ attack.

Answers

Answer:

"Advanced persistent threat " is the right one.

Explanation:

APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period. They represent compound channel assaults that use different components including various approaches of attack.

In the development stages where an application is not yet sufficiently mature enough to be able to be placed into a test environment, which of the following techniques are applicable?

a. Static Binary Code Analysis and Manual Binary Review
b. Static Source Code Analysis and Manual Code Review
c. Dynamic Binary Code Analysis and Static Binary Review
d. Dynamic Source Code Analysis and Automatic Code Review

Answers

Answer:

A and C

Explanation:

To create a list to store integers, use:________

a. ArrayList list = new ArrayList();
b. ArrayList list = new ArrayList();
c. ArrayList list = new ArrayList();
d. ArrayList list = new ArrayList();

Answers

Answer:

ArrayList<Integer> list = new ArrayList<>();

Explanation:

From the list of given options a to d

ArrayList represents the list name

Also, the syntax is similar to java programming language. Hence, I'll answer this question base on the syntax of Java programming language.

In java, the syntax to declare a list is

[Variable-name]<list-type> list = [Variable-name]<list-type>();

Replace [Varable-name] with ArrayList

ArrayList<list-type> list = ArrayList<list-type>();

From the question, the list is meant to store integers;

So, replace list-type with integer...

This gives

ArrayList<Integer> list = new ArrayList<>();

What is one way you might code-switch when posting a comment to a class discussion?

Answers

Answer:

The term code switching has been expanded and can encapsulate in any situation that speaker find to be switch from vocabulary.

Explanation:

It is a truly remarkable skill when you communicate your emotions, thoughts and opinion to others. It does not mean that we just to communicate our language but our language influence our thought, emotions and language and self identity.

we communicate our culture that is reflected in our language. Our language tells that who we are and from where we comes.

Code switching is related to the speakers alternates use of multiple language. in the one communication.

For example: Grace for beautiful gift ( Esta awesome).

_is a computer network created for an individual person

Answers

Answer:

Personal area network

Explanation:

is correct 100% sure

What should you do if you copy a sentence from a book into a document
you are writing for your employer?
A. Ask your boss to read the document.
B. Give credit to the author for the work you used in your document.
C. Check the spelling of your document.
ОА
OB
Ос
HINT
SUBMIT
PREVIOUS
5 of 18
here to search
A
The

Answers

Answer:

Your answer is going to be B

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was when the employee last performed a backup. Which type of network is the company more than likely using?

Answers

WWW/ World Wide Web.

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery

Answers

Complete Question:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Group of answer choices

A. servers

B. PaaS

C. IaaS

D. SaaS

Answer:

D. SaaS

Explanation:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease software as a service (SaaS) are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

Miguel, your system administrator, warns you of a new virus threat. This particular virus changes forms to avoid detection by antivirus software. What type of virus is it?

Answers

Answer:

I think it is Polymorphic virus.

which of the following is something that an information systems (IS) professional would do? A. devise new ways to use computers B. turn information into meaningful decisions C. help people with their technology needs D. create and maintain computer network

Answers

Answer:B

Explanation:

it professionals build and repair computers, create and aunts in networks, and help people with their technology needs.

An example of something that an information systems (IS) professional would do is: B. turn information into meaningful decisions.

An information system (IS) can be defined as a set of components or computer systems, that is typically used to collect, store, and process data, as well as for the dissemination of information, knowledge, and the distribution of digital products.

Basically, an information system (IS) interacts with its environment by receiving data in raw forms while information are received in a usable format.

Generally, all organizations make use of an information system (IS) in the following areas:

Supply chain management.To process financial accounts.Manage their workforce.Marketing channels to reach their customers or potential customers.Transform information into meaningful decisions.

In conclusion, the transformation of an information into meaningful decisions that are in tandem with organizational goals and objectives is something that an information systems (IS) professional would do.

Read more here: https://brainly.com/question/25162387

Why is taking care of your camera important?

Answers

taking care of your camera is important for keeping the camera functioning properly and lasting a long time.

Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnoticed so they can continue to steal data c. conduct cyberwarfare d. reveal weaknesses in business and government websites and then force them offline

Answers

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Answers

Answer:

overclocking.

You should check your cooling when doing this, otherwise you can burn your processor.

utility software is also known as _____​

Answers

Answer:

Utility programs

The Google brand name appears on thousands of websites due to its ________ API. Select one: a. proprietary b. open source c. closed source d. user-controlled

Answers

Answer: open source

Explanation:

Typically, most applications that we run on our computer usually consist of a user interface. An application programming interface is also just an interface, which is not meant for users but rather applications.

The Google brand name appears on thousands of websites due to its open source API.

Which attitudes are most common among successful IT professionals?

Answers

Answer:

understanding the problem very well

writing documention to every piece of code you write

write clear and concise code

follow Industry accepted format for data storage

avoid recursion if possible

write modular code

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

Answers

Answer:

Ram or random access memory

Explanation:

Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?

a. Emperor penguins
b. Penguin colony
c. Emperor penguin large group
d. Emperor penguin family

Answers

Answer:

d. Emperor penguin family or b. Penguin colony

What is "social
comparison"?
A. When you compare your social life to others' social
life
B. When you compare your life to others' social media
posts and feel like your life is worse
C. When you compare your online posts to others'
online posts and feel like yours are worse
D. When you compare your life to others' online posts
and feel like your life is better

Answers

Answer:

A. When you compare your social life to others.

Answer:

A. When you compare your social life to others' sociallife...........

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

which is the correct APA format in books?​

Answers

Answer:

It includes the author's last name, the year, and  a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case

The APA in-text citation for a book includes the author's last name, the year, and (if relevant) a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case (only capitalize the first word and any proper nouns).

Which statement best describes what you would be aware of when you copy or move files from one place to another place?

Answers

Answer: The files are copied from the main folder or destination folder and pasted on another location or folder.

Explanation:

The files can be moved automatically from one folder to another. The files are then can be copied from one folder and pasted on another. The new file destination allows the automatic file renaming. The file can be erased or removed from the previous location. Copying a file is a means of content duplication.

Explain why computer users should use the cloud?

Answers

Developing in the cloud enables users to get their applications to market quickly. Hardware failures do not result in data loss because of networked backups. Cloud computing uses remote resources, saving organizations the cost of servers and other equipment.

How does Google work, why does it work that way?

Answers

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

Surrendering to digital distractions will likely result in learning more material. O False True​

Answers

Answer:True

Explanation:

What technique do API developers most commonly use to limit access to an API to authorised individuals and applications?

Answers

Answer:

API keys

Explanation:

API (Application Programming Interface) is a computing interface that defines the interaction between multiple software intermediaries.

API key is a specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication, and usually have a set of access rights to the API associated with it.

These are commonly used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

Other Questions
Salim and Anna met when they were in first grade, and they have been best friends for 10 years. Which part of this sentence is a clause? Samantha is wall papering her bedroom and wants to make sure that she bought enough wall paper. Each wall in her room measures 10 feet by 11 feet. How many rolls of wall paper will Samantha need if each roll covers a total of 25 square feet. Which of the following is not a concern that has come out of the widespread adoption of the Internet?Censorship of informationIncreased anonymitySelecting the correct browser to use for the sites you want to visitUnauthorized sharing of copyrighted information CentimetersA farmer is collecting data about one of her cows. Which of the following pointstypes of data is an example of qualitative data? Select all that apply. *The color of the cowThe number of pairs of chromosomes in each of the cow's body cellsThe body temperature of the cownneThe age of the cow What customary thing did Spanish people do to Africans Is this a pentagon or what?? Umm sorry I forgot Ill giv ya brainliest to the first on ...I know I can search on the internet but I just want to ask Brainly so yah.... )) Linda and her dad are making rock candy. The first step is to pour sugar into boilingwater. So, Linda opens a 4-cup bag of sugar. Linda's dad pours 3 cups into the water.()) What fraction of the bag of sugar does Linda's dad pour into the water? construct a rhombus having length of diagonals 6 cm and 8 cm Find the slope of the line through points (2,-4) and (2,7) How was gravity involved in the formation of the planets? Cite evidence from the text in your response. Quindlen cites many instances of contrasts and contradictions to support her claim. Identify one contrast and one contradiction, and explain how each helps strengthen her argument. Which number is irrational, and integer, and a real number A) -4/2 B) there is no such number What is the cell component that does most of the work of the cell working as tools, machines or structures 6. Which of the following function pairs are inverses? what is the answer to this question? A molecule composed of amino acids joined together. It contains nitrogen in addition to CHO Out of the 400 students in a final year in secondary school, 300 are offering biology and 190 are offering chemistry. I) how many student are offering both subject , if only 70 students are offering neither biology nor chemistry? I) how many students are offering at least one biology and chemistry? what is the building block of each of the four classes of organic molecules Answer and explain plz:) 1. At the beginning of The Fall of the House of Usher," what does thenarrator do?a. He listens to Roderick Usher's improvisations on the guitar.b. He travels with Roderick Usher to visit Usher's family home.c. He travels to visit Roderick Usher at Usher's family home.d. He helps Roderick Usher bury Roderick's sister Madeline in a vault.